[HTML][HTML] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

L Golightly, P Modesti, R Garcia, V Chang - Cyber Security and Applications, 2023 - Elsevier
Access Control is a crucial defense mechanism organizations can deploy to meet modern
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …

Survey on access control for community-centered collaborative systems

F Paci, A Squicciarini, N Zannone - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …

A survey on access control in the age of internet of things

J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …

Multiparty access control for online social networks: model and mechanisms

H Hu, GJ Ahn, J Jorgensen - IEEE transactions on knowledge …, 2012 - ieeexplore.ieee.org
Online social networks (OSNs) have experienced tremendous growth in recent years and
become a de facto portal for hundreds of millions of Internet users. These OSNs offer …

Detecting and resolving firewall policy anomalies

H Hu, GJ Ahn, K Kulkarni - IEEE Transactions on dependable …, 2012 - ieeexplore.ieee.org
The advent of emerging computing technologies such as service-oriented architecture and
cloud computing has enabled us to perform business services more efficiently and …

[PDF][PDF] 基于属性的访问控制关键技术研究综述

房梁, 殷丽华, 郭云川, 方滨兴 - 计算机学报, 2017 - cjc.ict.ac.cn
摘要云计算, 物联网等新型计算模式为我们提供了便捷的数据共享, 高效计算等服务,
极大地提高了数据的处理效率, 提升了计算和存储资源的利用能力. 但这些新型计算模式存储并 …

A survey on policy languages in network and security management

W Han, C Lei - Computer Networks, 2012 - Elsevier
Policy-driven management is gaining popularity today, mainly due to the ever-growing scale
and complexity of large networked systems. In these systems, policies are usually used to …

Ensuring continuous compliance through reconciling policy with usage

S Chari, I Molloy, Y Park, W Teiken - … of the 18th ACM symposium on …, 2013 - dl.acm.org
Organizations rarely define formal security properties or policies for their access control
systems, often choosing to react to changing needs. This paper addresses the problem of …

Multiparty authorization framework for data sharing in online social networks

H Hu, GJ Ahn - IFIP Annual Conference on Data and Applications …, 2011 - Springer
Online social networks (OSNs) have experienced tremendous growth in recent years and
become a de facto portal for hundreds of millions of Internet users. These OSNs offer …

System and method for role mining in identity management artificial intelligence systems using cluster based analysis of network identity graphs

MM Badawy, JF Ho - US Patent 10,554,665, 2020 - Google Patents
Systems and methods for embodiments of a graph based artificial intelligence systems for
identity management are disclosed. Embodiments of the identity management sys tems …