Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

Named data networking: a survey

D Saxena, V Raychoudhury, N Suri, C Becker… - Computer Science …, 2016 - Elsevier
Internet was developed as a packet data network where users and data sources (server)
with specific IP addresses interacted over a pre-established communication channel. This …

Security and privacy in the Internet of Things: Current status and open issues

M Abomhara, GM Køien - … conference on privacy and security in …, 2014 - ieeexplore.ieee.org
The Internet of Things at large will foster billions of devices, people and services to
interconnect and exchange information and useful data. As IoT systems will be ubiquitous …

Access control in Internet-of-Things: A survey

S Ravidas, A Lekidis, F Paci, N Zannone - Journal of Network and …, 2019 - Elsevier
Abstract The Internet of Things (IoT) is an emerging technology that is revolutionizing the
global economy and society. IoT enables a collaborative environment where different …

Controlchain: Blockchain as a central enabler for access control authorizations in the iot

OJA Pinno, ARA Gregio… - GLOBECOM 2017-2017 …, 2017 - ieeexplore.ieee.org
The IoT is pervading our daily activities and lives with devices scattered all over our cities,
transport systems, buildings, homes and bodies. This invasion of devices with sensors and …

A unified attribute-based access control model covering DAC, MAC and RBAC

X Jin, R Krishnan, R Sandhu - Data and Applications Security and Privacy …, 2012 - Springer
Recently, there has been considerable interest in attribute based access control (ABAC) to
overcome the limitations of the dominant access control models (ie, discretionary-DAC …

A hybrid solution for privacy preserving medical data sharing in the cloud environment

JJ Yang, JQ Li, Y Niu - Future Generation computer systems, 2015 - Elsevier
Storing and sharing of medical data in the cloud environment, where computing resources
including storage is provided by a third party service provider, raise serious concern of …

Co-speculating on dark scenarios and unintended consequences of a ubiquitous (ly) augmented reality

C Eghtebas, G Klinker, S Boll, M Koelle - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
The vision of a 'metaverse'may soon bring a ubiquitous (ly) Augmented Reality (UAR)
delivering context-aware, geo-located, and continuous blends of real and virtual elements …

Understanding and improving computational science storage access through continuous characterization

P Carns, K Harms, W Allcock, C Bacon, S Lang… - ACM Transactions on …, 2011 - dl.acm.org
Computational science applications are driving a demand for increasingly powerful storage
systems. While many techniques are available for capturing the I/O behavior of individual …

访问控制模型研究进展及发展趋势

李凤华, 苏铓, 史国振, 马建峰 - 电子学报, 2012 - ejournal.org.cn
访问控制的任务是保证信息资源不被非法使用和访问, 冲突检测与消解主要解决不同信息系统
安全策略不统一的问题. 随着计算机和网络通信技术的发展, 先后出现了自主访问控制模型 …