Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy

F Nazerian, H Motameni, H Nematzadeh - Journal of information security …, 2019 - Elsevier
In role-based access control (RBAC), users gain access to predetermined roles and
permissions. Thus, desired results are not achieved in emergency situations through policy …

[HTML][HTML] Efficient ABAC based information sharing within MQTT environments under emergencies

P Colombo, E Ferrari, ED Tümer - Computers & security, 2022 - Elsevier
Recent emergencies, such as the COVID-19 pandemic have shown how timely information
sharing is essential to promptly and effectively react to emergencies. Internet of Things has …

A Clark-Wilson and ANSI role-based access control model

T Tsegaye, S Flowerday - Information & Computer Security, 2020 - emerald.com
Purpose An electronic health record (EHR) enables clinicians to access and share patient
information electronically and has the ultimate goal of improving the delivery of healthcare …

[Retracted] Secure Delegation Using Enhanced Capability Model

KH Khan, IU Din, A Almogren… - Security and …, 2022 - Wiley Online Library
A secure delegation has a key role in collaborative and dynamic systems, and it brings new
challenges to security mechanisms. Secure delegation requires a flexible model that …

Towards an extension of RBAC model

A BOUADJEMI, MK ABDI - International Journal of Computing …, 2020 - journals.uob.edu.bh
Role-based access control has been widely used in critical information systems. Access
control models describe the frameworks that dictate permissions. The role-based access …

[PDF][PDF] Dynamic trust emergency role-based access control (DTE–RBAC)

A Arora, A Gosain - International Journal of Computer …, 2020 - researchgate.net
Data Warehouse (DW) security has always been a critical challenge for DW designers
because of its global reachability via public networks. In order to maintain trade-off among …

[PDF][PDF] Importance of delegation function in the management process on the example of managers in the Republic of Croatia

AG Zunac, P Ercegovac… - Economic and Social …, 2022 - researchgate.net
Many companies do not realize their full potential due to insufficiently clearly set and defined
goals. Managers who know the tools to achieve SMART goals have clear visions for the …

Context-based risk-adaptive security model and conflict management

M Teimourikia, G Marilli, M Fugini - … 2016, Porto, Portugal, September 5-8 …, 2016 - Springer
In dynamic and risk-prone environments, security rules should be flexible enough to permit
the treatment of risks, and to manage privileges on resources based on the situation at hand …

Access Control Within MQTT-based IoT environments

ED Tumer - 2022 - irinsubria.uninsubria.it
IoT applications, which allow devices, companies, and users to join the IoT ecosystems, are
growing in popularity since they increase our lifestyle quality day by day. However, due to …

[PDF][PDF] Context-based Risk-Adaptive Security Model and Run-time Conflict Analysis

M Teimourikia, G Marilli, M Fugini - 2016 - fugini.faculty.polimi.it
In dynamic and risk-prone environments, security rules should be flexible enough to permit
the treatment of risks, and to manage privileges on physical and virtual resources for various …