A framework for risk-aware role based access control

KZ Bijon, R Krishnan, R Sandhu - 2013 IEEE Conference on …, 2013 - ieeexplore.ieee.org
Over the years, role based access control (RBAC) has remained a dominant form of access
control both in the industry and academia. More recently, the need for risk awareness in …

FRAMH: A federated learning risk-based authorization middleware for healthcare

C Mazzocca, N Romandini, M Colajanni… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Modern healthcare systems operate in highly dynamic environments requiring adaptable
access control mechanisms. Access to sensitive data and medical equipment should be …

A dynamic risk-based access control architecture for cloud computing

DR Dos Santos, CM Westphall… - 2014 IEEE network …, 2014 - ieeexplore.ieee.org
Cloud computing is a distributed computing model that still faces problems. New ideas
emerge to take advantage of its features and among the research challenges found in the …

A framework for risk assessment in access control systems

H Khambhammettu, S Boulares, K Adi, L Logrippo - Computers & Security, 2013 - Elsevier
We describe a framework for risk assessment specifically within the context of risk-based
access control systems, which make authorization decisions by determining the security risk …

Content-based access control: Use data content to assist access control for large-scale content-centric databases

W Zeng, Y Yang, B Luo - … Conference on Big Data (Big Data), 2014 - ieeexplore.ieee.org
In conventional database access control models, access control policies are explicitly
specified for each role against each data object. In large-scale content-centric data sharing …

A Framework for Context Sensitive Risk‐Based Access Control in Medical Information Systems

D Choi, D Kim, S Park - Computational and mathematical …, 2015 - Wiley Online Library
Since the access control environment has changed and the threat of insider information
leakage has come to the fore, studies on risk‐based access control models that decide …

Risk-aware RBAC sessions

KZ Bijon, R Krishnan, R Sandhu - … 2012, Guwahati, India, December 15-19 …, 2012 - Springer
Abstract Role Based Access Control (RBAC) has received considerable attention as a
model of choice for simplified access control over the past decade. More recently, risk …

Privacy considerations for risk-based authentication systems

S Wiefling, J Tolsdorf, LL Iacono - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Risk-based authentication (RBA) extends authentication mechanisms to make them more
robust against account takeover attacks, such as those using stolen passwords. RBA is …

RCBAC: A risk-aware content-based access control model for large-scale text data

K Ma, G Yang, Y Xiang - Journal of Network and Computer Applications, 2020 - Elsevier
Unstructured data (mostly text data) have become a vital part in the era of big data. Hence, it
has become increasingly difficult to identify the internal relations among data and describing …

An FPGA-based general-purpose data acquisition controller

CCW Robson, A Bousselham - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
System development in advanced FPGAs allows considerable flexibility, both during
development and in production use. A mixed firmware/software solution allows the …