A survey on access control mechanisms for cloud computing

R El Sibai, N Gemayel, J Bou Abdo… - Transactions on …, 2020 - Wiley Online Library
Cloud computing is an Internet‐based computing where the information technology
resources are provided to end users following their request. With this technology, users and …

Scalable role-based access control using the eos blockchain

MU Rahman - arXiv preprint arXiv:2007.02163, 2020 - arxiv.org
Role-based access control (RBAC) policies represent the rights of subjects in terms of roles
to access resources. This research proposes a scalable, flexible and auditable RBAC …

A distributed approach to delegation of access rights for electronic health records

MFF Khan, K Sakamura - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Delegation of access rights to patients' health records is an important feature for eHealth
systems. Often considered an add-on to legacy access control systems, most of the existing …

[图书][B] Enterprise level security 2: Advanced techniques for information technology in an uncertain world

KE Foltz, WR Simpson - 2020 - taylorfrancis.com
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the
authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of …

An Enhanced Control Protocol Design for LADN in 5G Wireless Networks

JH Kim - Journal of The Korea Society of Computer and …, 2020 - koreascience.kr
In this paper, we analyze LADN (Local Area Data Network) that provides high throughput,
low latency and service localization for 5G wireless networks and propose an enhanced …

Proposal of the Objective Function of Trust for the Dynamic Delegation and Automatic Revocation of Roles

C Seyed, S Ouya, PS Diop, D Sow - The Impact of the 4th …, 2020 - books.google.com
The question of delegation of roles based on trust level remains ambiguous because,
according to the literature, the selection criteria to validate the trust level of are still …