Survey on access control for community-centered collaborative systems

F Paci, A Squicciarini, N Zannone - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …

A survey on access control in the age of internet of things

J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …

[PDF][PDF] 基于属性的访问控制关键技术研究综述

房梁, 殷丽华, 郭云川, 方滨兴 - 计算机学报, 2017 - cjc.ict.ac.cn
摘要云计算, 物联网等新型计算模式为我们提供了便捷的数据共享, 高效计算等服务,
极大地提高了数据的处理效率, 提升了计算和存储资源的利用能力. 但这些新型计算模式存储并 …

Relationship-based access control: its expression and enforcement through hybrid logic

G Bruns, PWL Fong, I Siahaan, M Huth - Proceedings of the second ACM …, 2012 - dl.acm.org
Access control policy is typically defined in terms of attributes, but in many applications it is
more natural to define permissions in terms of relationships that resources, systems, and …

Monitoring compliance policies over incomplete and disagreeing logs

D Basin, F Klaedtke, S Marinovic… - Runtime Verification: Third …, 2013 - Springer
When monitoring system behavior to check compliance against a given policy, one is
sometimes confronted with incomplete knowledge about system events. In IT systems, such …

Cyberspace-oriented access control: A cyberspace characteristics-based model and its policies

F Li, Z Li, W Han, T Wu, L Chen… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
With wide development of various information technologies, our daily activities are
becoming deeply dependent on cyberspace. People often use handheld devices (eg …

Security patterns modeling and formalization for pattern-based development of secure software systems

B Hamid, S Gürgens, A Fuchs - Innovations in Systems and Software …, 2016 - Springer
Pattern-based development of software systems has gained more attention recently by
addressing new challenges such as security and dependability. However, there are still …

CG-DIQA: No-reference document image quality assessment based on character gradient

H Li, F Zhu, J Qiu - 2018 24th International Conference on …, 2018 - ieeexplore.ieee.org
Document image quality assessment (DIQA) is an important and challenging problem in real
applications. In order to predict the quality scores of document images, this paper proposes …

Sophisticated access control via SMT and logical frameworks

K Arkoudas, R Chadha, J Chiang - ACM Transactions on Information and …, 2014 - dl.acm.org
We introduce a new methodology for formulating, analyzing, and applying access-control
policies. Policies are expressed as formal theories in the SMT (satisfiability-modulo-theories) …

Policies for Fair Exchanges of Resources

L Ceragioli, P Degano, L Galletta, L Viganò - arXiv preprint arXiv …, 2024 - arxiv.org
People increasingly use digital platforms to exchange resources in accordance to some
policies stating what resources users offer and what they require in return. In this paper, we …