[HTML][HTML] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

L Golightly, P Modesti, R Garcia, V Chang - Cyber Security and Applications, 2023 - Elsevier
Access Control is a crucial defense mechanism organizations can deploy to meet modern
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …

Computer security

D Gollmann - Wiley Interdisciplinary Reviews: Computational …, 2010 - Wiley Online Library
Computer security encompasses concepts and methods for protecting sensitive resources in
computer systems. Computer security starts from the policies that regulate access to …

[图书][B] Handbook of research on modern cryptographic solutions for computer and cyber security

B Gupta, DP Agrawal, S Yamaguchi - 2016 - books.google.com
Internet usage has become a facet of everyday life, especially as more technological
advances have made it easier to connect to the web from virtually anywhere in the …

On the security of public key protocols

D Dolev, A Yao - IEEE Transactions on information theory, 1983 - ieeexplore.ieee.org
Recently the use of public key encryption to provide secure network communication has
received considerable attention. Such public key systems are usually effective against …

[PDF][PDF] Cryptography and Data Security

DE Denning - 1982 - calhoun.nps.edu
Electronic computers have evolved from exiguous experimental enterprises in the 1940s to
prolific practical data processing systems in the 1980s. As we have come to rely on these …

Computer viruses: theory and experiments

F Cohen - Computers & security, 1987 - Elsevier
This paper introduces “computer viruses” and examines their potential for causing
widespread damage to computer systems. Basic theoretical results are presented, and the …

[图书][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

What are the trend and core knowledge of information security? A citation and co-citation analysis

WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes
potential safety hazards to organizations. In response to the increasing academia and …

The UCONABC usage control model

J Park, R Sandhu - ACM transactions on information and system security …, 2004 - dl.acm.org
In this paper, we introduce the family of UCONABC models for usage control (UCON), which
integrate Authorizations (A), oBligations (B), and Conditions (C). We call these core models …

Access control: Policies, models, and mechanisms

P Samarati, SC De Vimercati - … school on foundations of security analysis …, 2000 - Springer
Access control is the process of mediating every request to resources and data maintained
by a system and determining whether the request should be granted or denied. The access …