Current research and open problems in attribute-based access control
D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …
Named data networking: a survey
Internet was developed as a packet data network where users and data sources (server)
with specific IP addresses interacted over a pre-established communication channel. This …
with specific IP addresses interacted over a pre-established communication channel. This …
Security and privacy in the Internet of Things: Current status and open issues
M Abomhara, GM Køien - … conference on privacy and security in …, 2014 - ieeexplore.ieee.org
The Internet of Things at large will foster billions of devices, people and services to
interconnect and exchange information and useful data. As IoT systems will be ubiquitous …
interconnect and exchange information and useful data. As IoT systems will be ubiquitous …
Access control in Internet-of-Things: A survey
Abstract The Internet of Things (IoT) is an emerging technology that is revolutionizing the
global economy and society. IoT enables a collaborative environment where different …
global economy and society. IoT enables a collaborative environment where different …
Controlchain: Blockchain as a central enabler for access control authorizations in the iot
OJA Pinno, ARA Gregio… - GLOBECOM 2017-2017 …, 2017 - ieeexplore.ieee.org
The IoT is pervading our daily activities and lives with devices scattered all over our cities,
transport systems, buildings, homes and bodies. This invasion of devices with sensors and …
transport systems, buildings, homes and bodies. This invasion of devices with sensors and …
A unified attribute-based access control model covering DAC, MAC and RBAC
Recently, there has been considerable interest in attribute based access control (ABAC) to
overcome the limitations of the dominant access control models (ie, discretionary-DAC …
overcome the limitations of the dominant access control models (ie, discretionary-DAC …
A hybrid solution for privacy preserving medical data sharing in the cloud environment
Storing and sharing of medical data in the cloud environment, where computing resources
including storage is provided by a third party service provider, raise serious concern of …
including storage is provided by a third party service provider, raise serious concern of …
Co-speculating on dark scenarios and unintended consequences of a ubiquitous (ly) augmented reality
The vision of a 'metaverse'may soon bring a ubiquitous (ly) Augmented Reality (UAR)
delivering context-aware, geo-located, and continuous blends of real and virtual elements …
delivering context-aware, geo-located, and continuous blends of real and virtual elements …
Understanding and improving computational science storage access through continuous characterization
Computational science applications are driving a demand for increasingly powerful storage
systems. While many techniques are available for capturing the I/O behavior of individual …
systems. While many techniques are available for capturing the I/O behavior of individual …
访问控制模型研究进展及发展趋势
李凤华, 苏铓, 史国振, 马建峰 - 电子学报, 2012 - ejournal.org.cn
访问控制的任务是保证信息资源不被非法使用和访问, 冲突检测与消解主要解决不同信息系统
安全策略不统一的问题. 随着计算机和网络通信技术的发展, 先后出现了自主访问控制模型 …
安全策略不统一的问题. 随着计算机和网络通信技术的发展, 先后出现了自主访问控制模型 …