Access control technologies for Big Data management systems: literature review and future trends

P Colombo, E Ferrari - Cybersecurity, 2019 - Springer
Data security and privacy issues are magnified by the volume, the variety, and the velocity of
Big Data and by the lack, up to now, of a reference data model and related data …

A survey of challenges for runtime verification from advanced application domains (beyond software)

C Sánchez, G Schneider, W Ahrendt, E Bartocci… - Formal Methods in …, 2019 - Springer
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …

Programming pervasive and mobile computing applications with the TOTA middleware

M Mamei, F Zambonelli - Second IEEE Annual Conference on …, 2004 - ieeexplore.ieee.org
Pervasive computing calls for suitable middleware and programming models to deal with
large software systems dived in dynamic mobile network environments. Here we present the …

A review of scientific research in defensive cyberspace operation tools and technologies

PL Goethals, ME Hunt - Journal of Cyber Security Technology, 2019 - Taylor & Francis
The realm of cybersecurity is perhaps one of the most quickly evolving areas within today's
research space. New and emerging technologies, as well as the growth of cybersecurity …

A formal approach for the verification of AWS IAM access control policies

E Zahoor, Z Asma, O Perrin - Service-Oriented and Cloud Computing: 6th …, 2017 - Springer
Cloud computing offers elastic, scalable and on-demand network access to a shared pool of
computing resources, such as storage, computation and others. Resources can be rapidly …

The next 700 policy miners: A universal method for building policy miners

C Cotrini, L Corinzia, T Weghorn, D Basin - Proceedings of the 2019 …, 2019 - dl.acm.org
A myriad of access control policy languages have been and continue to be proposed. The
design of policy miners for each such language is a challenging task that has required …

Synthesis of probabilistic privacy enforcement

M Kučera, P Tsankov, T Gehr, M Guarnieri… - Proceedings of the 2017 …, 2017 - dl.acm.org
Existing probabilistic privacy enforcement approaches permit the execution of a program
that processes sensitive data only if the information it leaks is within the bounds specified by …

Authorization policies specification and consistency management within multi-cloud environments

E Zahoor, A Ikram, S Akhtar, O Perrin - Secure IT Systems: 23rd Nordic …, 2018 - Springer
Cloud computing can be defined as a model for providing on-demand access to a shared
pool of configurable computing resources. In this paper we address the specification and …

Evaluating the effects of access control policies within NoSQL systems

P Colombo, E Ferrari - Future Generation Computer Systems, 2021 - Elsevier
Access control is a key service of any data management system. It allows regulating the
access to data resources at different granularity levels on the basis of access control models …

Access control synthesis for physical spaces

P Tsankov, MT Dashti, D Basin - 2016 IEEE 29th Computer …, 2016 - ieeexplore.ieee.org
Access-control requirements for physical spaces, like office buildings and airports, are best
formulated from a global viewpoint in terms of system-wide requirements. For example," …