Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

An overview of access control mechanisms for internet of things

M Alramadhan, K Sha - 2017 26th International Conference on …, 2017 - ieeexplore.ieee.org
The integration of the physical world and the cyber system in IoT brings significant
challenges to the design of security solutions. Access control is considered to be a critical …

Relationship-based access control for online social networks: Beyond user-to-user relationships

Y Cheng, J Park, R Sandhu - … Security, Risk and Trust and 2012 …, 2012 - ieeexplore.ieee.org
User-to-user (U2U) relationship-based access control has become the most prevalent
approach for modeling access control in online social networks (OSNs), where authorization …

Context sensitive access control in smart home environments

S Dutta, SSL Chukkapalli, M Sulgekar… - 2020 IEEE 6th Intl …, 2020 - ieeexplore.ieee.org
The rise in popularity of Internet of Things (IoT) devices has opened doors for privacy and
security breaches in Cyber-Physical systems like smart homes, smart vehicles, and smart …

An access control model for online social networks using user-to-user relationships

Y Cheng, J Park, R Sandhu - IEEE transactions on dependable …, 2015 - ieeexplore.ieee.org
Users and resources in online social networks (OSNs) are interconnected via various types
of relationships. In particular, user-to-user relationships form the basis of the OSN structure …

Path conditions and principal matching: a new approach to access control

J Crampton, J Sellwood - Proceedings of the 19th ACM symposium on …, 2014 - dl.acm.org
Traditional authorization policies are user-centric, in the sense that authorization is defined,
ultimately, in terms of user identities. We believe that this user-centric approach is …

Open challenges in relationship-based privacy mechanisms for social network services

R Fogues, JM Such, A Espinosa… - International Journal of …, 2015 - Taylor & Francis
Social networking services (SNSs) such as Facebook and Twitter have experienced
explosive growth during the few past years. Millions of users have created their profiles on …

Toward automated cyber defense with secure sharing of structured cyber threat intelligence

MF Haque, R Krishnan - Information Systems Frontiers, 2021 - Springer
Cyber Threat sharing helps with defending against cyber attacks in a timely manner. Many
frameworks have been proposed for CTI sharing such as Structured Threat Information …

Activity control design principles: Next generation access control for smart and collaborative systems

J Park, R Sandhu, M Gupta, S Bhatt - IEEE Access, 2021 - ieeexplore.ieee.org
Traditionally, access control solutions have focused on how to utilize a specific type of
decision parameter for access control decisions. While these “decision parameter”-focused …

[图书][B] Security and trust in online social networks

B Carminati, E Ferrari, M Viviani - 2022 - books.google.com
The enormous success and diffusion that online social networks (OSNs) are encountering
nowadays is vastly apparent. Users' social interactions now occur using online social media …