Understanding and improving computational science storage access through continuous characterization

P Carns, K Harms, W Allcock, C Bacon, S Lang… - ACM Transactions on …, 2011 - dl.acm.org
Computational science applications are driving a demand for increasingly powerful storage
systems. While many techniques are available for capturing the I/O behavior of individual …

Privacy-aware role-based access control

Q Ni, E Bertino, J Lobo, C Brodie, CM Karat… - ACM Transactions on …, 2010 - dl.acm.org
In this article, we introduce a comprehensive framework supporting a privacy-aware access
control mechanism, that is, a mechanism tailored to enforce access control to data …

Formal model and policy specification of usage control

X Zhang, F Parisi-Presicce, R Sandhu… - ACM Transactions on …, 2005 - dl.acm.org
The recent usage control model (UCON) is a foundation for next-generation access control
models with distinguishing properties of decision continuity and attribute mutability. A usage …

Towards the development of privacy-aware systems

P Guarda, N Zannone - Information and Software Technology, 2009 - Elsevier
Privacy and data protection are pivotal issues in nowadays society. They concern the right to
prevent the dissemination of sensitive or confidential information of individuals. Many …

How to securely break into RBAC: the BTG-RBAC model

A Ferreira, D Chadwick, P Farinha… - 2009 Annual …, 2009 - ieeexplore.ieee.org
Access control models describe frameworks that dictate how subjects (eg users) access
resources. In the role-based access control (RBAC) model access to resources is based on …

Privacy APIs: Access control techniques to analyze and verify legal privacy policies

MJ May, CA Gunter, I Lee - 19th IEEE Computer Security …, 2006 - ieeexplore.ieee.org
There is a growing interest in establishing rules to regulate the privacy of citizens in the
treatment of sensitive personal data such as medical and financial records. Such rules must …

On the modeling and analysis of obligations

K Irwin, T Yu, WH Winsborough - … of the 13th ACM conference on …, 2006 - dl.acm.org
Traditional security policies largely focus on access control requirements, which specify who
can access what under what circumstances. Besides access control requirements, the …

A logical specification for usage control

X Zhang, J Park, F Parisi-Presicce… - Proceedings of the ninth …, 2004 - dl.acm.org
Recently presented usage control (UCON) has been considered as the next generation
access control model with distinguishing properties of decision continuity and attribute …

Enabling context-aware and privacy-conscious user data sharing

R Hull, B Kumar, D Lieuwen… - … on Mobile Data …, 2004 - ieeexplore.ieee.org
This paper provides detail on two key components of the Houdini framework under
development at Bell Labs, that enable context-aware and privacy-conscious user data …

A privacy-aware access control system

CA Ardagna, M Cremonini… - Journal of …, 2008 - content.iospress.com
The protection of privacy is an increasing concern in our networked society because of the
growing amount of personal information that is being collected by a number of commercial …