[HTML][HTML] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

L Golightly, P Modesti, R Garcia, V Chang - Cyber Security and Applications, 2023 - Elsevier
Access Control is a crucial defense mechanism organizations can deploy to meet modern
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …

SecGenAI: Enhancing Security of Cloud-based Generative AI Applications within Australian Critical Technologies of National Interest

CY Haryanto, MH Vu, TD Nguyen… - arXiv preprint arXiv …, 2024 - arxiv.org
The rapid advancement of Generative AI (GenAI) technologies offers transformative
opportunities within Australia's critical technologies of national interest while introducing …

Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare

P Choksy, A Chaurasia, UP Rao, S Kumar - Peer-to-Peer Networking and …, 2023 - Springer
Due to the meteoric rise of cloud computing and the Internet of Things (IoT) concepts, remote
monitoring of patients in real-time has become possible, and patients can now get …

Credtrust: Credential based issuer management for trust in self-sovereign identity

R Mukta, HY Paik, Q Lu… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Self Sovereign Identity (SSI) facilitates secure issuance and verification of digitised
credentials without having to rely on a centralised authority. Most SSI implementations rely …

[HTML][HTML] An improved smart contract-based bring your own device (BYOD) security control framework

KA Almarhabi - Alexandria Engineering Journal, 2024 - Elsevier
The evolution of mobile technology has produced new methods and policies for
organisations to process data and communicate. Bring your own device (BYOD), which …

SecureCheck: User-Centric and Geolocation-Aware Access Mediation Contracts for Sharing Private Data

J Hopkins, C Rubio-Medrano - … of the 29th ACM Symposium on Access …, 2024 - dl.acm.org
Data oversharing is a critical issue in today's technologically driven society. Numerous
entities, ie, corporations, governments, criminal groups, are collecting individuals' data. One …

Automatic Generation of Attribute-Based Access Control Policies from Natural Language Documents.

F Shan, Z Wang, M Liu… - Computers, Materials & …, 2024 - search.ebscohost.com
In response to the challenges of generating Attribute-Based Access Control (ABAC) policies,
this paper proposes a deep learning-based method to automatically generate ABAC policies …

HoBACDSL: HoBAC-focused Access Control Domain Specific Language

MM Diallo, M Adda - Procedia Computer Science, 2024 - Elsevier
Access control (AC) in IoT (Internet of Things) systems presents significant challenges.
These systems are evolving, heterogeneous, and dynamic, combined with the lack of …

From Passive Defense to Proactive Defence: Strategies and Technologies

C Shi, J Peng, S Zhu, X Ren - … on Artificial Intelligence Security and Privacy, 2023 - Springer
The goal of network defense mechanisms is to enable systems to actively detect and
withstand attacks, reduce reliance on external security measures, and quickly recover and …

A Comprehensive Review on Granularity Perspective of the Access Control Models in Cloud Computing

AK Routh, P Ranjan - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
In this review, we explore into the critical realm of access control in cloud computing, a
fundamental component ensuring data and resource confidentiality, integrity, and …