A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues
Over the last few decades, the proliferation of the Internet of Things (IoT) has produced an
overwhelming flow of data and services, which has shifted the access control paradigm from …
overwhelming flow of data and services, which has shifted the access control paradigm from …
Survey on access control for community-centered collaborative systems
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …
collaborative systems and platforms. These systems and platforms aim to provide an …
An automatic attribute-based access control policy extraction from access logs
With the rapid advances in computing and information technologies, traditional access
control models have become inadequate in terms of capturing fine-grained, and expressive …
control models have become inadequate in terms of capturing fine-grained, and expressive …
A survey on policy languages in network and security management
W Han, C Lei - Computer Networks, 2012 - Elsevier
Policy-driven management is gaining popularity today, mainly due to the ever-growing scale
and complexity of large networked systems. In these systems, policies are usually used to …
and complexity of large networked systems. In these systems, policies are usually used to …
Relationship-based access control for online social networks: Beyond user-to-user relationships
User-to-user (U2U) relationship-based access control has become the most prevalent
approach for modeling access control in online social networks (OSNs), where authorization …
approach for modeling access control in online social networks (OSNs), where authorization …
A user-to-user relationship-based access control model for online social networks
Users and resources in online social networks (OSNs) are interconnected via various types
of relationships. In particular, user-to-user relationships form the basis of the OSN structure …
of relationships. In particular, user-to-user relationships form the basis of the OSN structure …
Relationship-based access control: its expression and enforcement through hybrid logic
Access control policy is typically defined in terms of attributes, but in many applications it is
more natural to define permissions in terms of relationships that resources, systems, and …
more natural to define permissions in terms of relationships that resources, systems, and …
A new access control scheme for Facebook-style social networks
The popularity of online social networks (OSNs) makes the protection of users' private
information an important but scientifically challenging problem. In the literature, relationship …
information an important but scientifically challenging problem. In the literature, relationship …
An access control model for online social networks using user-to-user relationships
Users and resources in online social networks (OSNs) are interconnected via various types
of relationships. In particular, user-to-user relationships form the basis of the OSN structure …
of relationships. In particular, user-to-user relationships form the basis of the OSN structure …
A survey of techniques to prevent sybil attacks
RM John, JP Cherian… - … conference on soft …, 2015 - ieeexplore.ieee.org
Any decentralized, distributed network isvulnerable to the Sybil attack wherein a malicious
node masquerade as several different nodes, called Sybil nodes disrupting the proper …
node masquerade as several different nodes, called Sybil nodes disrupting the proper …