Current research and open problems in attribute-based access control

D Servos, SL Osborn - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
Attribute-based access control (ABAC) is a promising alternative to traditional models of
access control (ie, discretionary access control (DAC), mandatory access control (MAC), and …

A survey on access control mechanisms for cloud computing

R El Sibai, N Gemayel, J Bou Abdo… - Transactions on …, 2020 - Wiley Online Library
Cloud computing is an Internet‐based computing where the information technology
resources are provided to end users following their request. With this technology, users and …

Task–role-based access control model

S Oh, S Park - Information systems, 2003 - Elsevier
There are many information objects and users in a large company. It is an important issue
how to control user's access in order that only authorized user can access information …

A policy based approach to security for the semantic web

L Kagal, T Finin, A Joshi - International semantic web conference, 2003 - Springer
Along with developing specifications for the description of meta-data and the extraction of
information for the Semantic Web, it is important to maximize security in this environment …

A rule-based framework for role-based delegation and revocation

L Zhang, GJ Ahn, BT Chu - … on Information and System Security (TISSEC …, 2003 - dl.acm.org
Delegation is the process whereby an active entity in a distributed environment authorizes
another entity to access resources. In today's distributed systems, a user often needs to act …

A privacy preservation model for facebook-style social network systems

PWL Fong, M Anwar, Z Zhao - … : 14th European Symposium on Research in …, 2009 - Springer
Recent years have seen unprecedented growth in the popularity of social network systems,
with Facebook being an archetypical example. The access control paradigm behind the …

ROWLBAC: representing role based access control in OWL

T Finin, A Joshi, L Kagal, J Niu, R Sandhu… - Proceedings of the 13th …, 2008 - dl.acm.org
There have been two parallel themes in access control research in recent years. On the one
hand there are efforts to develop new access control models to meet the policy needs of real …

A model of OASIS role-based access control and its support for active security

J Bacon, K Moody, W Yao - … on Information and System Security (TISSEC …, 2002 - dl.acm.org
OASIS is a role-based access control architecture for achieving secure interoperation of
services in an open, distributed environment. The aim of OASIS is to allow autonomous …

PBDM: a flexible delegation model in RBAC

X Zhang, S Oh, R Sandhu - Proceedings of the eighth ACM symposium …, 2003 - dl.acm.org
Role-based access control (RBAC) is recognized as an efficient access control model for
large organizations. Most organizations have some business rules related to access control …

Extending access control models with break-glass

AD Brucker, H Petritsch - Proceedings of the 14th ACM symposium on …, 2009 - dl.acm.org
Access control models are usually static, ie, permissions are granted based on a policy that
only changes seldom. Especially for scenarios in health care and disaster management, a …