Current research and open problems in attribute-based access control
D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
A survey on empirical security analysis of access-control systems: a real-world perspective
S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …
flexible mechanisms to enforce different access levels. Their importance in organisations to …
Towards formal verification of role-based access control policies
Specifying and managing access control policies is a challenging problem. We propose to
develop formal verification techniques for access control policies to improve the current state …
develop formal verification techniques for access control policies to improve the current state …
An access control model for resource sharing based on the role-based access control intended for multi-domain manufacturing internet of things
Manufacturing Internet of Things (MIoT) represents the manufacturing oriented to Internet of
Things with two important characteristics, resource sharing and process collaboration …
Things with two important characteristics, resource sharing and process collaboration …
Efficient policy analysis for administrative role based access control
Administrative RBAC (ARBAC) policies specify how Role-Based Access Control (RBAC)
policies may be changed by each administrator. It is often difficult to fully understand the …
policies may be changed by each administrator. It is often difficult to fully understand the …
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as
an important problem in security. Enterprise access-control systems have grown to protect …
an important problem in security. Enterprise access-control systems have grown to protect …
Specification and verification of separation of duty constraints in attribute-based access control
Constraints form an important aspect of any access control system and are often regarded
as one of the principle motivations behind developing different access control models. The …
as one of the principle motivations behind developing different access control models. The …
[图书][B] Attribute-based access control models and implementation in cloud infrastructure as a service
X Jin - 2014 - search.proquest.com
Recently, there has been considerable interest in attribute-based access control (ABAC) to
overcome the limitations of the classical access control models (ie, discretionary-DAC …
overcome the limitations of the classical access control models (ie, discretionary-DAC …
Reachability analysis for attributes in ABAC with group hierarchy
Attribute-based access control (ABAC) models are widely used to provide fine-grained and
adaptable authorization based on the attributes of users, resources, and other relevant …
adaptable authorization based on the attributes of users, resources, and other relevant …
Analysis of SEAndroid policies: Combining MAC and DAC in Android
Android has become a dominant computing platform, and its popularity has coincided with a
surge of malware. The incorporation of Security-Enhanced Linux in Android (SEAndroid) is …
surge of malware. The incorporation of Security-Enhanced Linux in Android (SEAndroid) is …