TrustBAC: integrating trust relationships into the RBAC model for access control in open systems

S Chakraborty, I Ray - Proceedings of the eleventh ACM symposium on …, 2006 - dl.acm.org
Conventional access control are suitable for regulating access to resources by known users.
However, these models have often found to be inadequate for open and decentralized multi …

A trust-based context-aware access control model for web-services

R Bhatti, E Bertino, A Ghafoor - Distributed and Parallel Databases, 2005 - Springer
A key challenge in Web services security is the design of effective access control schemes
that can adequately meet the unique security challenges posed by the Web services …

Securecloud: Towards a comprehensive security framework for cloud computing environments

H Takabi, JBD Joshi, GJ Ahn - 2010 IEEE 34th Annual …, 2010 - ieeexplore.ieee.org
Cloud computing has recently gained tremendous momentum but still is in its infancy. It has
the potential for significant cost reduction and the increased operating efficiencies in …

XML-based specification for web services document security

R Bhatti, E Bertino, A Ghafoor, JBD Joshi - Computer, 2004 - ieeexplore.ieee.org
The Internet and related technologies have seen tremendous growth in distributed
applications such as medicine, education, e-commerce, and digital libraries. As demand …

Method and system for authentication by defining a demanded level of security

LY Gomez, I Thomas - US Patent 8,490,154, 2013 - Google Patents
There is provided a computer-implemented method for authentication, the method
comprising: defining a demanded level of security in an authorization service of a server; …

[PDF][PDF] Review of access control models for cloud computing

N Meghanathan - Computer Science & Information Science, 2013 - researchgate.net
The relationship between users and resources is dynamic in the cloud, and service
providers and users are typically not in the same security domain. Identity-based security …

SBA-XACML: Set-based approach providing efficient policy decision process for accessing Web services

A Mourad, H Jebbaoui - Expert systems with applications, 2015 - Elsevier
Policy-based computing is taking an increasing role in providing real-time decisions and
governing the systematic interaction among distributed Web services. XACML (eXtensible …

Access control policy analysis using free variable tableaux

H Kamoda, M Yamaoka, S Matsuda… - Information and Media …, 2006 - jstage.jst.go.jp
The specification of access control policies for large, multi-organization applications is
difficult and error-prone. Sophisticated policies are needed for fine-grained control of access …

A role-based approach to access control for XML databases

J Wang, SL Osborn - Proceedings of the ninth ACM symposium on …, 2004 - dl.acm.org
In order to provide a general access control methodology for parts of XML documents, we
propose combining role-based access control as found in the Role Graph Model, with a …

The e language: A fresh separation of concerns

Y Hollander, M Morley, A Noy - Proceedings Technology of …, 2001 - ieeexplore.ieee.org
The e programming language enjoys widespread use in the microchip industry with
applications to specification, modeling, testing and verification of hardware systems and …