Liver tumors segmentation from abdominal CT images using region growing and morphological processing

OF Abd-Elaziz, MS Sayed… - … on engineering and …, 2014 - ieeexplore.ieee.org
Computer Aided Diagnosis of liver tumors from abdominal Computer Tomography (CT)
images requires segmentation of tumor. Automatic segmentation of tumor from CT images is …

Usage control in cloud systems

A Lazouski, G Mancini, F Martinelli… - … Conference for Internet …, 2012 - ieeexplore.ieee.org
Cloud system peculiarities, such as enormous resources and long-lasting accesses,
introduce new security and management challenges. This paper presents an advanced …

NodeSentry: Least-privilege library integration for server-side JavaScript

W De Groef, F Massacci, F Piessens - Proceedings of the 30th Annual …, 2014 - dl.acm.org
Node. js is a popular JavaScript server-side framework with an efficient runtime for cloud-
based event-driven architectures. Its strength is the presence of thousands of third-party …

JACPoL: a simple but expressive JSON-based access control policy language

H Jiang, A Bouabdallah - Information Security Theory and Practice: 11th …, 2018 - Springer
Along with the rapid development of ICT technologies, new areas like Industry 4.0, IoT and
5G have emerged and brought out the need for protecting shared resources and services …

Analyzing XACML policies using answer set programming

M Rezvani, D Rajaratnam, A Ignjatovic… - International Journal of …, 2019 - Springer
With the tremendous growth of Web applications and services, eXtensible Access Control
Markup Language (XACML) has been broadly adopted to specify Web access control …

XACSim: a new tool for measuring similarity of XACML security policies

Z Katebi, M Nassiri, M Rezvani - Cluster Computing, 2023 - Springer
XACML is a standard to define a declarative fine-grained, attribute-based access control
security policy language. Evaluation of the similarity of XACML policies can be used for a …

Measurement and prediction of access control policy evaluation performance

B Butler, B Jennings - IEEE Transactions on Network and …, 2015 - ieeexplore.ieee.org
As the need for more pervasive and more complex access controls grows, the challenge of
ensuring the performance of access control systems is becoming apparent. Researchers …

Beyond scale: an efficient framework for evaluating web access control policies in the era of big data

T Liu, Y Wang - Advances in Information and Computer Security: 10th …, 2015 - Springer
Recently explosive growth in data and the rapid development of communicate technologies
bring us into the era of big data. As an important security strategy, access control calls for …

Elimination of the redundancy related to combining algorithms to improve the PDP evaluation performance

F Deng, LY Zhang, BY Zhou… - Mathematical …, 2016 - Wiley Online Library
If there are lots of redundancies in the policies loaded on the policy decision point (PDP) in
the authorization access control model, the system will occupy more resources in operation …

Security middleground for resource protection in measurement infrastructure-as-a-service

R Akella, S Debroy, P Calyam… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Securing multi-domain network performance monitoring (NPM) systems that are being
widely deployed asMeasurement Infrastructure-as-a-Service'(MIaaS) in high-performance …