Traditional and hybrid access control models: a detailed survey

MU Aftab, A Hamza, A Oluwasanmi… - Security and …, 2022 - Wiley Online Library
Access control mechanisms define the level of access to the resources among specified
users. It distinguishes the users as authorized or unauthorized based on appropriate …

A thorough trust and reputation based RBAC model for secure data storage in the cloud

M Ghafoorian, D Abbasinezhad-Mood… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cloud computing is a widespread technology, which has attracted much attention
nowadays. Among the many criteria that must be considered for data storage in the cloud …

A hybrid access control model with dynamic COI for secure localization of satellite and IoT-based vehicles

MU Aftab, Y Munir, A Oluwasanmi, Z Qin, MH Aziz… - IEEE …, 2020 - ieeexplore.ieee.org
Secure localization of vehicles is gaining the attention of researchers from both academia
and industry especially due to the emergence of internet of things (IoT). The modern …

[PDF][PDF] Healthcare models and algorithms for privacy and security in healthcare records

B Mahapatra, R Krishnamurthi… - Security and privacy of …, 2019 - researchgate.net
With the ever-increasing cost of healthcare and premium healthcare insurance, there is a
significant need for proactive healthcare and wellness. Considering the present status of …

Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing

K El Makkaoui, A Beni-Hssane, A Ezzati - Journal of Ambient Intelligence …, 2019 - Springer
Homomorphic encryption (HE) technique provides a third party with the ability to execute
operations on ciphertexts. This property can be considered as a good solution to overcome …

Permission-based separation of duty in dynamic role-based access control model

MU Aftab, Z Qin, NW Hundera, O Ariyo, Zakria, NT Son… - Symmetry, 2019 - mdpi.com
A major development in the field of access control is the dominant role-based access control
(RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the …

Trust based access control model for securing electronic healthcare system

A Singh, K Chatterjee - Journal of Ambient Intelligence and Humanized …, 2019 - Springer
An important issue in the Cloud-Based Electronic Healthcare System (CBEHS) is to protect
the sensitive data and resources from the untrusted user. Enforcing the protection in the …

Fast Cloud–Paillier homomorphic schemes for protecting confidentiality of sensitive data in cloud computing

K El Makkaoui, A Ezzati, A Beni-Hssane… - Journal of Ambient …, 2020 - Springer
With homomorphic encryption (HE), data can be processed in its encrypted form in the cloud
computing (CC). This HE property can be considered as a useful solution to get over some …

[PDF][PDF] Secure and Reliable Data sharing scheme using Attribute-based Encryption with weighted attribute-based Encryption in Cloud Environment

C Yadav, V Yadav, J Kumar - International journal of electrical and …, 2021 - academia.edu
░ ABSTRACT: The field of data management has been reformed by the Cloud computing
technologies which offered valuable establishments and amended the storage restrictions …

A swift Cloud-Paillier scheme to protect sensitive data confidentiality in cloud computing

K El Makkaoui, A Ezzati, A Beni-Hssane… - Procedia computer …, 2018 - Elsevier
Concerns over the confidentiality of sensitive data are still the main obstacles limiting the
wide-spread adoption of cloud services. Actually, scientists have suggested a new …