Privacy preservation of electronic health records in the modern era: A systematic survey

R Nowrozy, K Ahmed, ASM Kayes, H Wang… - ACM Computing …, 2024 - dl.acm.org
Building a secure and privacy-preserving health data sharing framework is a topic of great
interest in the healthcare sector, but its success is subject to ensuring the privacy of user …

Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud

C Yang, L Tan, N Shi, B Xu, Y Cao, K Yu - IEEE Access, 2020 - ieeexplore.ieee.org
Cloud is a computing model that provides sharing and supports ubiquitous on-demand
access computing, providing new data processing and services for many industries …

[PDF][PDF] 云计算访问控制技术研究综述

王于丁, 杨家海, 徐聪, 凌晓, 杨洋 - 软件学报, 2015 - jos.org.cn
随着云计算规模化和集约化的发展, 云安全问题成为云计算领域亟待突破的重要问题.
访问控制技术是安全问题的重中之重, 其任务是通过限制用户对数据信息的访问能力及范围 …

RABAC: role-centric attribute-based access control

X Jin, R Sandhu, R Krishnan - … for Computer Network Security, MMM-ACNS …, 2012 - Springer
Role-based access control (RBAC) is a commercially dominant model, standardized by the
National Institute of Standards and Technology (NIST). Although RBAC provides compelling …

PARBAC: Priority-attribute-based RBAC model for azure IoT cloud

A Thakare, E Lee, A Kumar, VB Nikam… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Duties are segregated within a team by using the role-based access control (RBAC) in the
Azure Internet of Things (IoT) framework, and only an appropriate level of access is granted …

Towards digital engineering: the advent of digital systems engineering

J Huang, A Gheorghe, H Handley… - … Journal of System …, 2020 - inderscienceonline.com
Digital engineering, the digital transformation of engineering to leverage digital
technologies, is coming globally. This paper explores digital systems engineering, which …

Attributes enhanced role-based access control model

QM Rajpoot, CD Jensen, R Krishnan - Trust, Privacy and Security in Digital …, 2015 - Springer
Attribute-based access control (ABAC) and role-based access control (RBAC) are currently
the two most popular access control models. Yet, they both have known limitations and offer …

Integrating attributes into role-based access control

QM Rajpoot, CD Jensen, R Krishnan - … and Privacy XXIX: 29th Annual IFIP …, 2015 - Springer
Role-based access control (RBAC) and attribute-based access control (ABAC) are currently
the most prominent access control models. However, they both suffer from limitations and …

Optimization of access control policies

S Kern, T Baumer, S Groll, L Fuchs, G Pernul - Journal of Information …, 2022 - Elsevier
Organizations undertake complex and costly projects to model high-quality Access Control
Policies (ACPs). Once built, these policies must be maintained and managed in an ongoing …