A systematic literature review for authorization and access control: definitions, strategies and models

AKYS Mohamed, D Auer, D Hofer… - International journal of web …, 2022 - emerald.com
Purpose Authorization and access control have been a topic of research for several
decades. However, existing definitions are inconsistent and even contradicting each other …

A novel two phase data sensitivity based access control framework for healthcare data

S Saha, C Chowdhury, S Neogy - Multimedia Tools and Applications, 2024 - Springer
This paper proposes a secure data access control framework that utilizes the attribute values
and the user specific usage details to provide secure and fine-grained data access. It aims to …

[HTML][HTML] Linear time algorithms to restrict insider access using multi-policy access control systems

P Mell, J Shook, R Harang, S Gavrila - Journal of wireless mobile …, 2017 - ncbi.nlm.nih.gov
An important way to limit malicious insiders from distributing sensitive information is to as
tightly as possible limit their access to information. This has always been the goal of access …

An information flow control model in a topic-based publish/subscribe system

S Nakamura, L Ogiela, T Enokido… - Journal of High Speed …, 2018 - content.iospress.com
A publish/subscribe (PS) model is an event-driven model of a distributed system. In
traditional PS systems, each peer (process) can either publish or subscribe events. In this …

[HTML][HTML] Content sensitivity based access control framework for Hadoop

TKA Kumar, H Liu, JP Thomas, X Hou - Digital Communications and …, 2017 - Elsevier
Big data technologies have seen tremendous growth in recent years. They are widely used
in both industry and academia. In spite of such exponential growth, these technologies lack …

RCBAC: A risk-aware content-based access control model for large-scale text data

K Ma, G Yang, Y Xiang - Journal of Network and Computer Applications, 2020 - Elsevier
Unstructured data (mostly text data) have become a vital part in the era of big data. Hence, it
has become increasingly difficult to identify the internal relations among data and describing …

Knowledge Based Access Control a model for security and privacy in the Big Data

L El Haourani, AA Elkalam, AA Ouahman - Proceedings of the 3rd …, 2018 - dl.acm.org
The most popular features of Big Data revolve around the so-called" 3V" criterion: Volume,
Variety and Velocity. Big Data is based on the massive collection and in-depth analysis of …

Dynamic data sensitivity access control in Hadoop platform

HA Idar, K Aissaoui, H Belhadaoui… - 2018 IEEE 5th …, 2018 - ieeexplore.ieee.org
Smart technological innovations are exponentially generating big amounts of data leading to
the need for new processing and storage technologies. Hadoop is the main Big Data …

Metadata based need-to-know view in large-scale video surveillance systems

S Sultan, CD Jensen - Computers & Security, 2021 - Elsevier
Large-scale video surveillance systems are increasingly seen as the answer to problems
concerning public safety, law enforcement, and situational awareness in public places …

Authorization strategies and classification of access control models

A Mohamed, D Auer, D Hofer, J Küng - Future Data and Security …, 2021 - Springer
Access control enforces authorization policies in order to prohibit unauthorized users from
performing actions that could trigger a security violation. There exist numerous access …