A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues

ASM Kayes, R Kalaria, IH Sarker, MS Islam, PA Watters… - Sensors, 2020 - mdpi.com
Over the last few decades, the proliferation of the Internet of Things (IoT) has produced an
overwhelming flow of data and services, which has shifted the access control paradigm from …

Survey on access control for community-centered collaborative systems

F Paci, A Squicciarini, N Zannone - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …

An automatic attribute-based access control policy extraction from access logs

L Karimi, M Aldairi, J Joshi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the rapid advances in computing and information technologies, traditional access
control models have become inadequate in terms of capturing fine-grained, and expressive …

A survey on policy languages in network and security management

W Han, C Lei - Computer Networks, 2012 - Elsevier
Policy-driven management is gaining popularity today, mainly due to the ever-growing scale
and complexity of large networked systems. In these systems, policies are usually used to …

Relationship-based access control for online social networks: Beyond user-to-user relationships

Y Cheng, J Park, R Sandhu - … Security, Risk and Trust and 2012 …, 2012 - ieeexplore.ieee.org
User-to-user (U2U) relationship-based access control has become the most prevalent
approach for modeling access control in online social networks (OSNs), where authorization …

A user-to-user relationship-based access control model for online social networks

Y Cheng, J Park, R Sandhu - Data and Applications Security and Privacy …, 2012 - Springer
Users and resources in online social networks (OSNs) are interconnected via various types
of relationships. In particular, user-to-user relationships form the basis of the OSN structure …

Relationship-based access control: its expression and enforcement through hybrid logic

G Bruns, PWL Fong, I Siahaan, M Huth - Proceedings of the second ACM …, 2012 - dl.acm.org
Access control policy is typically defined in terms of attributes, but in many applications it is
more natural to define permissions in terms of relationships that resources, systems, and …

A new access control scheme for Facebook-style social networks

J Pang, Y Zhang - Computers & Security, 2015 - Elsevier
The popularity of online social networks (OSNs) makes the protection of users' private
information an important but scientifically challenging problem. In the literature, relationship …

An access control model for online social networks using user-to-user relationships

Y Cheng, J Park, R Sandhu - IEEE transactions on dependable …, 2015 - ieeexplore.ieee.org
Users and resources in online social networks (OSNs) are interconnected via various types
of relationships. In particular, user-to-user relationships form the basis of the OSN structure …

A survey of techniques to prevent sybil attacks

RM John, JP Cherian… - … conference on soft …, 2015 - ieeexplore.ieee.org
Any decentralized, distributed network isvulnerable to the Sybil attack wherein a malicious
node masquerade as several different nodes, called Sybil nodes disrupting the proper …