Access control in collaborative systems

W Tolone, GJ Ahn, T Pai, SP Hong - ACM Computing Surveys (CSUR), 2005 - dl.acm.org
Balancing the competing goals of collaboration and security is a difficult, multidimensional
problem. Collaborative systems often focus on building useful connections among people …

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

M Deng, K Wuyts, R Scandariato, B Preneel… - Requirements …, 2011 - Springer
Ready or not, the digitalization of information has come, and privacy is standing out there,
possibly at stake. Although digital privacy is an identified priority in our society, few …

System and method for XML data representation of portlets

PB Griffin - US Patent 7,367,014, 2008 - Google Patents
US7367014B2 - System and method for XML data representation of portlets - Google Patents
US7367014B2 - System and method for XML data representation of portlets - Google Patents …

System and method for server security and entitlement processing

P Patrick - US Patent 7,392,546, 2008 - Google Patents
(58) Field of Classification Search............... 707/110 plugins to be inserted into a security
service hosted by a 709/200 203, 212–234, 238 246; 710/1, server, and to control access to …

Context-aware role-based access control in pervasive computing systems

D Kulkarni, A Tripathi - Proceedings of the 13th ACM symposium on …, 2008 - dl.acm.org
In this paper we present a context-aware RBAC (CARBAC) model for pervasive computing
applications. The design of this model has been guided by the context-based access control …

TrustBAC: integrating trust relationships into the RBAC model for access control in open systems

S Chakraborty, I Ray - Proceedings of the eleventh ACM symposium on …, 2006 - dl.acm.org
Conventional access control are suitable for regulating access to resources by known users.
However, these models have often found to be inadequate for open and decentralized multi …

A model of OASIS role-based access control and its support for active security

J Bacon, K Moody, W Yao - … on Information and System Security (TISSEC …, 2002 - dl.acm.org
OASIS is a role-based access control architecture for achieving secure interoperation of
services in an open, distributed environment. The aim of OASIS is to allow autonomous …

Programmable {In-Network} security for context-aware {BYOD} policies

Q Kang, L Xue, A Morrison, Y Tang, A Chen… - 29th USENIX Security …, 2020 - usenix.org
Bring Your Own Device (BYOD) has become the new norm for enterprise networks, but
BYOD security remains a top concern. Context-aware security, which enforces access …

Modelling contexts in the Or-BAC model

F Cuppens, A Miege - 19th Annual Computer Security …, 2003 - ieeexplore.ieee.org
As computer infrastructures become more complex, security models must provide means to
handle more flexible and dynamic requirements. In the organization based access control …

System and method for incrementally distributing a security policy in a computer network

MS Moriconi, S Godik, M Xu, K Yagen - US Patent 7,363,650, 2008 - Google Patents
Feb. 12, 1999, now Pat. No. 6,158,010, said applica-application guard uses the distributed
change to update the tion No. 10/017.368 is a continuation-in-part of appli-currently …