Packet: a privacy-aware access control policy composition method for services composition in cloud environments

L Lin, J Hu, J Zhang - Frontiers of Computer Science, 2016 - Springer
Combining different independent cloud services must coordinate their access control
policies. Otherwise unauthorized access to composite cloud service can occur when …

SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation

H Wang, A Yu, L Xiao, J Li, X Cao - … of the 29th ACM Symposium on …, 2024 - dl.acm.org
Nowadays, SELinux has been widely applied in Linux systems to enforce security policy and
provide flexible MAC. However, improperly configured rules in policies may cause illegal …

Precursors of role-based access control design in KMS: A conceptual framework

G Nyame, Z Qin - Information, 2020 - mdpi.com
Role-based access control (RBAC) continues to gain popularity in the management of
authorization concerning access to knowledge assets in organizations. As a socio-technical …

Context-based risk-adaptive security model and conflict management

M Teimourikia, G Marilli, M Fugini - … 2016, Porto, Portugal, September 5-8 …, 2016 - Springer
In dynamic and risk-prone environments, security rules should be flexible enough to permit
the treatment of risks, and to manage privileges on resources based on the situation at hand …

Improving Web Applications Security Using Path-Based Role Access Control Model

D Kononov, S Isaev - 2018 3rd Russian-Pacific Conference on …, 2018 - ieeexplore.ieee.org
Web applications security is a complex problem with several aspects. One aspect is access
control according to specified security policy. This work is dedicated to developing security …

[PDF][PDF] Context-based Risk-Adaptive Security Model and Run-time Conflict Analysis

M Teimourikia, G Marilli, M Fugini - 2016 - fugini.faculty.polimi.it
In dynamic and risk-prone environments, security rules should be flexible enough to permit
the treatment of risks, and to manage privileges on physical and virtual resources for various …

Расширенная ролевая модель безопасности на основе RBAC для защиты веб-сервисов

ДД Кононов - Редакционная коллегия, 2019 - elibrary.ru
Целью работы является улучшение расширенной ролевой модели безопасности,
основанной на RBAC (Role Based Access Control). Приведено описание существующей …

[PDF][PDF] Extended Request-oriented Role Access Control Model for Web Applications

D KONONOV, S ISAEV - scholar.archive.org
This work is dedicated to developing security access control model for web applications. Our
work is focused on RBAC model described by Ferraiolo and Kuhn [1992] and Sandhu …

Does the knowledge-sharing platform specialist matter in knowledge sharing for secured KMS?

G Nyame, Z Qin - Human Systems Management, 2021 - content.iospress.com
BACKGROUND: Knowledge remains a competitive, intangible resource in today's
contemporary organizations. Most knowledge management initiatives aimed at leveraging …

МУЛЬТИДОМЕННОЕ РАЗГРАНИЧЕНИЕ ДОСТУПА В РАСШИРЕННОЙ РОЛЕВОЙ МОДЕЛИ БЕЗОПАСНОСТИ НА ОСНОВЕ RBAC

ДД Кононов - РЕШЕТНЕВСКИЕ ЧТЕНИЯ, 2020 - elibrary.ru
Целью работы является улучшение расширенной ролевой модели безопасности,
основанной на RBAC (Role Based Access Control). В работе приведено описание …