H Gao, Z Ma, S Luo, Y Xu, Z Wu - … Communications and Mobile …, 2021 - Wiley Online Library
… fine-grainedaccesscontrol of shared data is realized by CP-ABE. The DO can make different access … Meanwhile, fine-grainedaccesscontrol should also include fine-grained revocation…
SZR Rizvi, PWL Fong - ACM Transactions on Privacy and Security …, 2020 - dl.acm.org
… This alternative definition allows us to combine database queries with accesscontrol policies … on costly join operations, such as in relationaldatabases. One popular example of graph …
… as fine-grainedaccesscontrol and data privacy, balancing between them is not a trivial task as off-the-shelf solutions do not exist. On one hand, centralized cloud architectures provide …
… ACL’s along with OS can be used in a network context, relationaldatabasemanagement, etc… authority can achieve flexible fine-grainedaccesscontrol. Theoretical results are presented …
… In this paper, a data security enhanced Fine-GrainedAccessControl mechanism (FGAC) is … proposes a data security-oriented fine-grainedaccesscontrol mechanism FGAC. Table 1 …
… The proposed access broker not only provides fine-grainedaccesscontrol but also a centralized auditing approach (see Fig. 12). By employing the Ranger Audit Server, the BDF …
… In the systemmodel, we consider an access pattern privacypreserving similarity query scheme with accesscontrol in … and is commonly used to implement fine-grainedaccesscontrol for …
M Tan, A Liu, X Wang, S Shang, N Wang… - KSII Transactions on …, 2024 - itiis.org
… the problem of fine-grainedaccesscontrol in new computing … of accesscontrol, and is the mainstream model studied by … process of attribute-based accesscontrol, the current state of …
… However, in futue, if the list is more refined then I-RBAC core ontology can be improved which will subsequently result in fine-grainedaccesscontrol features in order to assign more …