Exploring architectures for cryptographic access control enforcement in the cloud for fun and optimization

S Berlato, R Carbone, AJ Lee, S Ranise - … and Communications Security, 2020 - dl.acm.org
… Based on technologies that include mobile and web applications together with electronic …
end-to-end confidentiality [15]. We summarize some of the most important architectural

Automatic policy generation for {Inter-Service} access control of microservices

X Li, Y Chen, Z Lin, X Wang, JH Chen - 30th USENIX Security …, 2021 - usenix.org
… policy enforcement, we utilize the end-to-end latency of the evaluation applications as the
… We recorded the end-to-end latency of the three applications with policies generated by the …

Formal modelling and automated trade-off analysis of enforcement architectures for cryptographic access control in the cloud

S Berlato, R Carbone, AJ Lee, S Ranise - … on Privacy and Security, 2021 - dl.acm.org
… include mobile and web applications together with electronic … Then, through a CAC scheme,
the citizen may share his data … country while still preserving end-to-end confidentiality [19]. …

End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs

G Scopelliti, S Pouyanrad, J Noorman, F Alder… - … on Privacy and Security, 2023 - dl.acm.org
… (private) data section, enforcing strict access rules for both. An … updates, and insufficient
access control, leading to potential … Furthermore, a web application is made available to local …

[HTML][HTML] End-to-end information flow security for web services orchestration

NB Said, I Cristescu - Science of Computer Programming, 2020 - Elsevier
… However, access control models control the direct accesses … set of WSs, and enforces
end-to-end security. Here, we focus on … a simplified social network application, called Whens_App …

Enforcing situation-aware access control to build malware-resilient file systems

T McIntosh, P Watters, ASM Kayes, A Ng… - Future Generation …, 2021 - Elsevier
… In our situation-aware access control framework and its application in a resilient file … to
encrypt data transmission for end-to-end security, with key management integrated into the file …

Enabling attribute-based access control in NoSQL databases

E Gupta, S Sural, J Vaidya… - … on emerging topics in …, 2022 - ieeexplore.ieee.org
application is subject to conditions that consider field values dynamically to allow regulating
end-to-end implementation for MongoDB. We define techniques for enforcing access to …

Zeph: Cryptographic enforcement of end-to-end data privacy

L Burkhalter, N Küchler, A Viand, H Shafagh… - … } Symposium on …, 2021 - usenix.org
access to the data for the first type of data consumers is handled by cryptographic access
control and … performance of Zeph as we integrate it into three applications with different privacy …

Towards end-to-end application slicing in multi-access edge computing systems: Architecture discussion and proof-of-concept

S Bolettieri, DT Bui, R Bruno - Future Generation Computer Systems, 2022 - Elsevier
management and orchestration of application and network services. Second, we propose an
end-to-end slice architecture … by explaining how application slice isolation is enforced using …

Dynamic and scalable enforcement of access control policies for big data

M Anisetti, CA Ardagna, C Braghin, E Damiani… - … on Management of …, 2021 - dl.acm.org
… processing capabilities, while loosely control is not acceptable in many application context.
New … It is clear that both services can be implemented using an ad hoc end-to-end analytic …