A survey on empirical security analysis of access-control systems: a real-world perspective
S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …
flexible mechanisms to enforce different access levels. Their importance in organisations to …
CG-DIQA: No-reference document image quality assessment based on character gradient
H Li, F Zhu, J Qiu - 2018 24th International Conference on …, 2018 - ieeexplore.ieee.org
Document image quality assessment (DIQA) is an important and challenging problem in real
applications. In order to predict the quality scores of document images, this paper proposes …
applications. In order to predict the quality scores of document images, this paper proposes …
[PDF][PDF] An Enhanced ABE based Secure Access Control Scheme for E-health Clouds.
The E-health clouds generate an enormous amount of data driven from PHR's, EHR's,
EMR's, patient care, compliance and regulatory requirements. To preserve the privacy and …
EMR's, patient care, compliance and regulatory requirements. To preserve the privacy and …
Formal approach to detect and resolve anomalies while clustering ABAC policies
In big data environments with big number of users and high volume of data, we need to
manage the corresponding huge number of security policies. Using Attribute-Based Access …
manage the corresponding huge number of security policies. Using Attribute-Based Access …
Compositional typed analysis of ARBAC policies
Model-checking is a popular approach to the security analysis of ARBAC policies, but its
effectiveness is hindered by the exponential explosion of the ways in which different users …
effectiveness is hindered by the exponential explosion of the ways in which different users …
Parameterized model checking for security policy analysis
We explain how a parameterized model checking technique can be exploited to mechanize
the analysis of access control policies. The main advantage of the approach is to reason …
the analysis of access control policies. The main advantage of the approach is to reason …
Solving the user-role reachability problem in ARBAC with role hierarchy
A Truong - 2016 International Conference on Advanced …, 2016 - ieeexplore.ieee.org
Access Control is becoming increasingly important for today's ubiquitous systems since it
provides mechanism to prevent sensitive resources in the systems against unauthorized …
provides mechanism to prevent sensitive resources in the systems against unauthorized …
[PDF][PDF] Efficient Policy Analysis for Evolving Administrative Role Based Access Control.
MI Gofman, P Yang - Int. J. Softw. Informatics, 2014 - ijsi.cnjournals.com
Abstract Role Based Access Control (RBAC) has been widely used for restricting resource
access to only authorized users. Administrative Role Based Access Control (ARBAC) …
access to only authorized users. Administrative Role Based Access Control (ARBAC) …
[PDF][PDF] Automated planning for administrating role-based access control
Understanding how to implement change in security controls is heavily reliant on expert
knowledge, both that intrinsic to how a system can be configured as well as how a current …
knowledge, both that intrinsic to how a system can be configured as well as how a current …
Efficient Analysis of Sequences of Security Problems in Access Control Systems
AT Truong - … and Sustainable Informatics: Proceedings of ICMCSI …, 2023 - Springer
In many ubiquitous systems, Access Control systems are often used to regulate system
access from users. One of the main components of such systems is the set of access rules …
access from users. One of the main components of such systems is the set of access rules …