Modern healthcare systems operate in highly dynamic environments requiring adaptable access control mechanisms. Access to sensitive data and medical equipment should be …
Cloud computing is a distributed computing model that still faces problems. New ideas emerge to take advantage of its features and among the research challenges found in the …
H Khambhammettu, S Boulares, K Adi, L Logrippo - Computers & Security, 2013 - Elsevier
We describe a framework for risk assessment specifically within the context of risk-based access control systems, which make authorization decisions by determining the security risk …
W Zeng, Y Yang, B Luo - … Conference on Big Data (Big Data), 2014 - ieeexplore.ieee.org
In conventional database access control models, access control policies are explicitly specified for each role against each data object. In large-scale content-centric data sharing …
D Choi, D Kim, S Park - Computational and mathematical …, 2015 - Wiley Online Library
Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk‐based access control models that decide …
Abstract Role Based Access Control (RBAC) has received considerable attention as a model of choice for simplified access control over the past decade. More recently, risk …
Risk-based authentication (RBA) extends authentication mechanisms to make them more robust against account takeover attacks, such as those using stolen passwords. RBA is …
K Ma, G Yang, Y Xiang - Journal of Network and Computer Applications, 2020 - Elsevier
Unstructured data (mostly text data) have become a vital part in the era of big data. Hence, it has become increasingly difficult to identify the internal relations among data and describing …
CCW Robson, A Bousselham - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
System development in advanced FPGAs allows considerable flexibility, both during development and in production use. A mixed firmware/software solution allows the …