Privacy preservation of electronic health records in the modern era: A systematic survey
Building a secure and privacy-preserving health data sharing framework is a topic of great
interest in the healthcare sector, but its success is subject to ensuring the privacy of user …
interest in the healthcare sector, but its success is subject to ensuring the privacy of user …
Current research and open problems in attribute-based access control
D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud
Cloud is a computing model that provides sharing and supports ubiquitous on-demand
access computing, providing new data processing and services for many industries …
access computing, providing new data processing and services for many industries …
[PDF][PDF] 云计算访问控制技术研究综述
王于丁, 杨家海, 徐聪, 凌晓, 杨洋 - 软件学报, 2015 - jos.org.cn
随着云计算规模化和集约化的发展, 云安全问题成为云计算领域亟待突破的重要问题.
访问控制技术是安全问题的重中之重, 其任务是通过限制用户对数据信息的访问能力及范围 …
访问控制技术是安全问题的重中之重, 其任务是通过限制用户对数据信息的访问能力及范围 …
RABAC: role-centric attribute-based access control
Role-based access control (RBAC) is a commercially dominant model, standardized by the
National Institute of Standards and Technology (NIST). Although RBAC provides compelling …
National Institute of Standards and Technology (NIST). Although RBAC provides compelling …
PARBAC: Priority-attribute-based RBAC model for azure IoT cloud
Duties are segregated within a team by using the role-based access control (RBAC) in the
Azure Internet of Things (IoT) framework, and only an appropriate level of access is granted …
Azure Internet of Things (IoT) framework, and only an appropriate level of access is granted …
Towards digital engineering: the advent of digital systems engineering
Digital engineering, the digital transformation of engineering to leverage digital
technologies, is coming globally. This paper explores digital systems engineering, which …
technologies, is coming globally. This paper explores digital systems engineering, which …
Attributes enhanced role-based access control model
Attribute-based access control (ABAC) and role-based access control (RBAC) are currently
the two most popular access control models. Yet, they both have known limitations and offer …
the two most popular access control models. Yet, they both have known limitations and offer …
Integrating attributes into role-based access control
Role-based access control (RBAC) and attribute-based access control (ABAC) are currently
the most prominent access control models. However, they both suffer from limitations and …
the most prominent access control models. However, they both suffer from limitations and …
Optimization of access control policies
Organizations undertake complex and costly projects to model high-quality Access Control
Policies (ACPs). Once built, these policies must be maintained and managed in an ongoing …
Policies (ACPs). Once built, these policies must be maintained and managed in an ongoing …