-
1
Access control in open distributed systems
Published 2012“…In this paper, we discuss two conventional access control mechanisms-access control lists and capabilities-which can be incorporated in the Linda·model, and their suitability and implications on the flexibility of the model.…”
Get full text
Conference or Workshop Item -
2
Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments
Published 2011“…Though eXtensible Access Control Markup Language (XACML) has a powerful capacity of expression, it does not support all the elements character of RBAC. …”
Get full text
Article -
3
Role performance trust-based access control for protecting sensitive attributes
Published 2016“…Preserving privacy is a challenge and requires the management of access control, which may be based on role, purpose or trust. …”
Get full text
Article -
4
Performance and divisional trust and purpose-based access control for privacy preservation
Published 2018“…To keep the privacy safe from inappropriate use, one of the most popular methods that can be used is the access control. Currently, many augmentation of access control models has been developed to improve the effectiveness in preserving the privacy. …”
Get full text
Article -
5
Trust, purpose, and role-based access control model for privacy protection
Published 2019“…Role-based access control model has been proposed to protect customer's data. …”
Get full text
Conference or Workshop Item -
6
Trust-based access control model with quantification method for protecting sensitive attributes
Published 2022“…Despite the recent advances in access control frameworks and models, there are still issues that hinder the implementation of successful access control. …”
Article -
7
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment
Published 2011“…Consequently, this paper formulates a model of collaborative KMS access control. The proposed model can be a guidance to study further the member of ACM family particularly the role based access control (RBAC) towards secure collaborative KMS.…”
Get full text
Conference or Workshop Item -
8
Blockchain-based access control scheme for secure shared personal health records over decentralised storage
Published 2021“…The access control scheme is constructed on the basis of the new lightweight cryptographic concept named smart contract-based attribute-based searchable encryption (SC-ABSE). …”
Article -
9
Implementing severity factor to mitigate malicious insider
Published 2019“…Many access control models and enforcement mechanisms have been proposed to prevent the unauthorized release of XML data. …”
Get full text
Article -
10
Policy inconsistency detection based on RBAC model in cross-organizational collaboration
Published 2011“…A model to prune and collect only the required policies based on access control requirements from different organizations is designed. …”
Get full text
Conference or Workshop Item -
11
User-independent and self-optimizing intrusion detection framework for large database systems
Published 2014“…Despite various access control approaches, databases are still vulnerable to intruders who are able to bypass these protective methods and access data, or prevent insiders like authorized users who misuse their privilege. …”
Article -
12
A compact bit string accessibility map for secure XML query processing
Published 2012“…One of the challenging issues related to specifying a fine-grained access control on the XML data is how to implement the accessibility map in a compact format with minimum affect on the XML query processing. …”
Get full text
Article -
13
A hybrid face detection system using combination of appearance-based and feature-based methods
Published 2009“…Human face detection is preliminary required step of face recognition systems as well as a very important task in many applications, such as security access control systems, video surveillance, human computer interface and image database management. …”
Get full text
Article -
14
An effective modality conflict model for identifying applicable policies during policy evaluation
Published 2018“…Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. …”
Get full text
Article -
15
An effective naming heterogeneity resolution for XACML policy evaluation in a distributed environment
Published 2021“…Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Naming heterogeneity between the attribute values of a request and a policy is common due to syntactic variations and terminological variations, particularly among organizations of a distributed environment. …”
Article -
16
A dynamic compressed accessibility map for secure XML querying and updating
Published 2015“…By specifying a fine-grained access control on the XML data, an accessibility map is required to determine the accessibility of XML nodes for a specific subject (e.g. user or role) under a specific action (e.g. read or write). …”
Get full text
Article