ABAC policy mining method based on hierarchical clustering and relationship extraction

S Shang, X Wang, A Liu - Computers & Security, 2024 - Elsevier
With the rapid development of information technology, the traditional access control model
has faced challenges in meeting the demands of practical applications. As a result, the …

Product responsibility disclosures: do they concern with customer privacy?

P Permatasari, K Tanimoto, A Setiawan… - Social Responsibility …, 2024 - emerald.com
Purpose With the growth in the use of technology currently, it is inevitable that all individuals
are currently facing the risk of data misuse by irresponsible parties. This study aims to …

VulRep: vulnerability repair based on inducing commits and fixing commits

Y Wei, L Bo, X Wu, Y Li, Z Ye, X Sun, B Li - EURASIP Journal on Wireless …, 2023 - Springer
With the rapid development of the information age, software vulnerabilities have threatened
the safety of communication and mobile network, and research on vulnerability repair is …

[HTML][HTML] NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research

AK Chaurasia, M Fallahi, T Strufe, P Terhörst… - Journal of Information …, 2024 - Elsevier
Biometric systems based on brain activity have been proposed as an alternative to
passwords or to complement current authentication techniques. By leveraging the unique …

A resilient inter-organizational workflow assignment plan selection approach: Application to a digital health use case

B Monsef, EB Hanan - International Journal of Engineering …, 2024 - journals.sagepub.com
Workflow Management Systems are rapidly evolving and increasingly used in a variety of
industries, allowing organizations to automate and enhance their business processes …

NeuroBench: An Open-Source Benchmark Framework for the Standardization of Methodology in Brainwave-based Authentication Research

AK Chaurasia, M Fallahi, T Strufe, P Terhörst… - arXiv preprint arXiv …, 2024 - arxiv.org
Biometric systems based on brain activity have been proposed as an alternative to
passwords or to complement current authentication techniques. By leveraging the unique …

Token-Revocation Access Control to Cloud-Hosted Energy Optimization Utility for Environmental Sustainability

K Riad - Applied Sciences, 2023 - mdpi.com
To increase the usage of renewable energy, it is vital to maximize local energy production by
properly combining various renewable-energy sources by collecting their data and storing it …

Towards a Modular Digital Twin Microservice Architecture for Urban Multi-Energy Systems

A Pastor, SA Uerlich, S Schwarz… - 2023 IEEE PES …, 2023 - ieeexplore.ieee.org
This paper proposes a formal definition of Digital Twins (DTs) and presents general Building
Blocks (BBs) advocating for a microservice architecture. The BBs are categorized into data …

A Comprehensive Review on Granularity Perspective of the Access Control Models in Cloud Computing

AK Routh, P Ranjan - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
In this review, we explore into the critical realm of access control in cloud computing, a
fundamental component ensuring data and resource confidentiality, integrity, and …

Achieve Your Goal Without Dying in the Attempt: Developing an Area-Based Support for Nomadic Work

G Monroy-Rodríguez, S Mendoza… - … Conference on Human …, 2023 - Springer
Organizations are constantly navigating a complex landscape of users, information, and
security policies. Nomadic workers and visitors move throughout the organization, accessing …