Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

Access control synthesis for physical spaces

P Tsankov, MT Dashti, D Basin - 2016 IEEE 29th Computer …, 2016 - ieeexplore.ieee.org
Access-control requirements for physical spaces, like office buildings and airports, are best
formulated from a global viewpoint in terms of system-wide requirements. For example," …

Safety and consistency of subject attributes for attribute-based pre-authorization systems

M Shakarami, R Sandhu - National Cyber Summit (NCS) Research Track, 2020 - Springer
Attribute-based access control (ABAC) systems typically enforce pre-authorization, whereby
an access decision is made once prior to granting or denying access. This decision utilizes …

Scalable and secure concurrent evaluation of history-based access control policies

M Decat, B Lagaisse, W Joosen - … of the 31st Annual Computer Security …, 2015 - dl.acm.org
Many of today's applications are deployed on large-scale distributed infrastructures to
handle large amounts of users concurrently. When applying access control to such …

[图书][B] Operation and administration of access control in IoT environments

M Shakarami - 2022 - search.proquest.com
Abstract The Internet of Things (IoT) denotes a network of evolving and expanding number
of technologies embedded in smart things with at least one network interface to interact with …

A Compact and Secure Access Control Solution Based on a Deterministic Finite Automaton

A Kulzhanova, T Bakibayev… - … and Informatics (ICAI …, 2023 - ieeexplore.ieee.org
Access control systems are critical in ensuring the security of various facilities, ranging from
residential buildings to corporate offices and government institutions. Traditional access …

[PDF][PDF] Access control with formal security guarantees

P Tsankov - 2016 - research-collection.ethz.ch
Access-control systems are essential for protecting sensitive resources, be it digital or
physical assets. Modern access-control systems are, however, complex software artifacts …

Security failure-tolerant role-based access control

D Jang - 2017 - ttu-ir.tdl.org
Abstract Role-Based Access Control (RBAC) is a well-known access control security service
that restricts access to valuable assets (or objects) using the roles in an organization …