Machine learning in identity and access management systems: Survey and deep dive

S Aboukadri, A Ouaddah, A Mezrioui - Computers & Security, 2024 - Elsevier
The evolution of identity and access management (IAM) has been driven by the expansion
of online services, cloud computing, and the Internet of Things (IoT). The proliferation of …

Methods and tools for policy analysis

AA Jabal, M Davari, E Bertino, C Makaya… - ACM Computing …, 2019 - dl.acm.org
Policy-based management of computer systems, computer networks and devices is a critical
technology especially for present and future systems characterized by large-scale systems …

Access control model extensions to support data privacy protection based on GDPR

M Davari, E Bertino - … International Conference on Big Data (Big …, 2019 - ieeexplore.ieee.org
The General Data Protection Regulation (GDPR) gives control of data to the data owner. It
imposes several requirements and obligations on organizations that process and manage …

Services for zero trust architectures-a research roadmap

E Bertino, K Brancik - 2021 IEEE International Conference on …, 2021 - ieeexplore.ieee.org
The notion of Zero Trust Architecture (ZTA) has been introduced as a fine-grained defense
approach. It assumes that no entities outside and inside the protected system can be trusted …

A novel conflict detection method for ABAC security policies

G Liu, W Pei, Y Tian, C Liu, S Li - Journal of Industrial Information …, 2021 - Elsevier
Attributed-based access control (ABAC) is widely used in systems with large resources and
users such as the Industrial Internet of Things (IIoT), Industrial information integration …

A privacy risk assessment scheme for fog nodes in access control system

C Ke, J Wu, F Xiao, Z Huang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In the fog computing, it is difficult to satisfy the security and privacy requirement for traditional
access control system, such as attribute-based access control system. Risk-based access …

[HTML][HTML] Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review

A Mohammad - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
As the functionality and services provided by cloud computing increase, control access to
these services becomes more complex, and more security breaches are generated. This is …

Data provenance in security and privacy

B Pan, N Stakhanova, S Ray - ACM Computing Surveys, 2023 - dl.acm.org
Provenance information corresponds to essential metadata that describes the entities, users,
and processes involved in the history and evolution of a data object. The benefits of tracking …

A hybrid boosted neural sensitive attribute detection machine learning algorithm for HABAC systems

C Kalpana, S Revathy - Multimedia Tools and Applications, 2024 - Springer
The sensitive attribute selection requires a well-trained machine-learning model to avoid
unauthorized access to sensitive data. A new hybrid approach Boosted Neural Sensitive …

Policy modeling and anomaly detection in ABAC policies

M Davari, M Zulkernine - International Conference on Risks and Security of …, 2021 - Springer
Sensitive data is available online through web and distributed protocols that highlight the
need for access control mechanisms. System designers write access control policies to …