SoK: context and risk aware access control for zero trust systems

S Xiao, Y Ye, N Kanwal, T Newe… - Security and …, 2022 - Wiley Online Library
Evolving computing technologies such as cloud, edge computing, and the Internet of Things
(IoT) are creating a more complex, dispersed, and dynamic enterprise operational …

Modeling and enforcing secure object flows in process-driven SOAs: an integrated model-driven approach

B Hoisl, S Sobernig, M Strembeck - Software & Systems Modeling, 2014 - Springer
In this paper, we present an integrated model-driven approach for the specification and the
enforcement of secure object flows in process-driven service-oriented architectures (SOA) …

A study of social interaction during mobile information seeking

EMY Tan, DHL Goh - Journal of the Association for Information …, 2015 - Wiley Online Library
With the increasing importance of social media in people's lives, more mobile applications
have incorporated features to support social networking activities. These applications …

Modelling context-aware RBAC models for mobile business processes

S Schefer-Wenzl, M Strembeck - International Journal of …, 2013 - inderscienceonline.com
In a mobile computing environment, distributed business processes are executed in varying
contexts. Context-aware access control mechanisms help to protect sensitive data and …

Generic support for RBAC break-glass policies in process-aware information systems

S Schefer-Wenzl, M Strembeck - Proceedings of the 28th annual ACM …, 2013 - dl.acm.org
We present a break-glass extension for process-related role-based access control (RBAC)
models. Our extension ensures the static (design-time) and dynamic (runtime) consistency of …

[PDF][PDF] A data modeling conceptual framework for ubiquitous computing based on context awareness.

SR Pungus, J Yahaya, A Deraman… - International Journal of …, 2019 - academia.edu
This paper introduces a framework for data modeling to support ubiquitous computing based
on context-awareness. Data always grow in term of volume, variety, velocity, and value. The …

Context-sensitive constraints for access control of business processes

G Milosavljević, G Sladić, B Milosavljević… - Computer Science …, 2018 - doiserbia.nb.rs
Workflow management systems (WfMS) are used to automate and facilitate business
processes of an enterprise. To simplify the administration, it is a common practice in many …

Model-driven specification and enforcement of RBAC break-glass policies for process-aware information systems

S Schefer-Wenzl, M Strembeck - Information and Software Technology, 2014 - Elsevier
Context In many organizational environments critical tasks exist which–in exceptional cases
such as an emergency–must be performed by a subject although he/she is usually not …

A UML extension for the model-driven specification of audit rules

B Hoisl, M Strembeck - … International Workshops, Gdańsk, Poland, June 25 …, 2012 - Springer
In recent years, a number of laws and regulations (such as the Basel II accord or SOX)
demand that organizations record certain activities or decisions to fulfill legally enforced …

A UML extension for modeling break-glass policies

S Schefer-Wenzl, M Strembeck - 2012 - dl.gi.de
In emergency situations, certain subjects sometimes have to perform important tasks
although they are usually not authorized to perform these tasks. Break-glass policies have …