A systematic literature review for authorization and access control: definitions, strategies and models

AKYS Mohamed, D Auer, D Hofer… - International journal of web …, 2022 - emerald.com
Purpose Authorization and access control have been a topic of research for several
decades. However, existing definitions are inconsistent and even contradicting each other …

Traditional and hybrid access control models: a detailed survey

MU Aftab, A Hamza, A Oluwasanmi… - Security and …, 2022 - Wiley Online Library
Access control mechanisms define the level of access to the resources among specified
users. It distinguishes the users as authorized or unauthorized based on appropriate …

A survey on access control deployment

V Suhendra - … : International Conference, SecTech 2011, Held as Part …, 2011 - Springer
Access control is a security aspect whose requirements evolve with technology advances
and, at the same time, contemporary social contexts. Multitudes of access control models …

Access control: The neglected frontier

R Sandhu - Australasian Conference on Information Security and …, 1996 - Springer
Access control is an indispensable security technology. However, it has been relatively
neglected by the research community. Over the past ten years, the doctrine of mandatory …

Authorization and access control

S De Capitani di Vimercati, S Foresti… - Security, Privacy, and …, 2007 - Springer
Access control is the process of controlling every request to a system and determining,
based on specified rules (authorizations), whether the request should be granted or denied …

Modeling enterprise authorization: a unified metamodel and initial validation

M Korman, R Lagerström… - … Systems Informatics and …, 2016 - csimq-journals.rtu.lv
Authorization and its enforcement, access control, have stood at the beginning of the art and
science of information security, and remain being crucial pillar of security in the information …

A role-involved purpose-based access control model

ME Kabir, H Wang, E Bertino - Information Systems Frontiers, 2012 - Springer
This paper presents a role-involved purpose-based access control (RPAC) model, where a
conditional purpose is defined as the intention of data accesses or usages under certain …

A novel cyberspace-oriented access control model

F Li, Y Wang, R Xie, J Xiong, F Shan - Cryptology ePrint Archive, 2015 - eprint.iacr.org
With the developments of mobile communication, networks and information technology,
many new information service patterns and dissemination modes emerge with some security …

Taxonomy and classification of access control models for cloud environments

A Majumder, S Namasudra, S Nath - … Rise of the Cloud: Advances and …, 2014 - Springer
Cloud computing is an emerging and highly attractive technology due to its inherent
efficiency, cost-effectiveness, flexibility, scalability and pay-per-use characteristics. But …

Attributes enhanced role-based access control model

QM Rajpoot, CD Jensen, R Krishnan - Trust, Privacy and Security in Digital …, 2015 - Springer
Attribute-based access control (ABAC) and role-based access control (RBAC) are currently
the two most popular access control models. Yet, they both have known limitations and offer …