A survey on access control deployment

V Suhendra - … : International Conference, SecTech 2011, Held as Part …, 2011 - Springer
Access control is a security aspect whose requirements evolve with technology advances
and, at the same time, contemporary social contexts. Multitudes of access control models …

Understanding and protecting privacy: Formal semantics and principled audit mechanisms

A Datta, J Blocki, N Christin, H DeYoung… - … on Information Systems …, 2011 - Springer
Privacy has become a significant concern in modern society as personal information about
individuals is increasingly collected, used, and shared, often using digital technologies, by a …

A decision methodology for managing operational efficiency and information disclosure risk in healthcare processes

X Bai, R Gopal, M Nunez, D Zhdanov - Decision support systems, 2014 - Elsevier
This paper addresses two critical challenges faced by healthcare organizations: significant
personnel shortages and mandates to safeguard patient safety and information security. We …

An approach to access control under uncertainty

F Salim, J Reid, E Dawson… - 2011 Sixth International …, 2011 - ieeexplore.ieee.org
In dynamic and uncertain environments such as healthcare, where the needs of security and
information availability are difficult to balance, an access control approach based on a static …

What's the value of your privacy? Exploring factors that influence privacy-sensitive contributions to participatory sensing applications

D Christin, C Büchner… - 38th Annual IEEE …, 2013 - ieeexplore.ieee.org
Mobile sensing applications leverage sensors embedded in today's mobile phones to gather
both user-centric and environmental data in unprecedented quantity and quality. The …

Topology-aware access control of smart spaces

L Pasquale, C Ghezzi, E Pasi, C Tsigkanos… - Computer, 2017 - ieeexplore.ieee.org
Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical
entities. A representation of the spaces' topology can reveal security-relevant contextual …

Audit mechanisms for provable risk management and accountable data governance

J Blocki, N Christin, A Datta, A Sinha - … on Decision and Game Theory for …, 2012 - Springer
Organizations that collect and use large volumes of personal information are expected
under the principle of accountable data governance to take measures to protect data …

Regret minimizing audits: A learning-theoretic basis for privacy protection

J Blocki, N Christin, A Datta… - 2011 IEEE 24th Computer …, 2011 - ieeexplore.ieee.org
Audit mechanisms are essential for privacy protection in permissive access control regimes,
such as in hospitals where denying legitimate access requests can adversely affect patient …

Budget-aware role based access control

F Salim, J Reid, U Dulleck, E Dawson - Computers & Security, 2013 - Elsevier
The suitability of Role Based Access Control (RBAC) is being challenged in dynamic
environments like healthcare. In an RBAC system, a user's legitimate access may be denied …

Specification and verification of a topology-aware access control model for cyber-physical space

Y Cao, Z Huang, S Kan, D Fan… - Tsinghua science and …, 2019 - ieeexplore.ieee.org
The cyber-physical space is a spatial environment that integrates the cyber and physical
worlds to provide an intelligent environment for users to conduct their day-to-day activities …