[HTML][HTML] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

L Golightly, P Modesti, R Garcia, V Chang - Cyber Security and Applications, 2023 - Elsevier
Access Control is a crucial defense mechanism organizations can deploy to meet modern
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …

Privacy-aware role-based access control

Q Ni, E Bertino, J Lobo, C Brodie, CM Karat… - ACM Transactions on …, 2010 - dl.acm.org
In this article, we introduce a comprehensive framework supporting a privacy-aware access
control mechanism, that is, a mechanism tailored to enforce access control to data …

Access control policy combining: theory meets practice

N Li, Q Wang, W Qardaji, E Bertino, P Rao… - Proceedings of the 14th …, 2009 - dl.acm.org
Many access control policy languages, eg, XACML, allow a policy to contain multiple sub-
policies, and the result of the policy on a request is determined by combining the results of …

Preventing information leakage from indexing in the cloud

A Squicciarini, S Sundareswaran… - 2010 IEEE 3rd …, 2010 - ieeexplore.ieee.org
Cloud computing enables highly scalable services to be easily consumed over the Internet
on an as-needed basis. While cloud computing is expanding rapidly and used by many …

An algebra for fine-grained integration of XACML policies

P Rao, D Lin, E Bertino, N Li, J Lobo - … of the 14th ACM symposium on …, 2009 - dl.acm.org
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid
computing, often require integrating access control policies of collaborating parties. Such an …

Expressive policy analysis with enhanced system dynamicity

R Craven, J Lobo, J Ma, A Russo, E Lupu… - Proceedings of the 4th …, 2009 - dl.acm.org
Despite several research studies, the effective analysis of policy based systems remains a
significant challenge. Policy analysis should at least (i) be expressive (ii) take account of …

Rumpole: a flexible break-glass access control model

S Marinovic, R Craven, J Ma, N Dulay - … of the 16th ACM symposium on …, 2011 - dl.acm.org
Access control operates under the assumption that it is possible to correctly encode and
predict all subjects' needs and rights. However, in human-centric pervasive domains, such …

Data protection models for service provisioning in the cloud

D Lin, A Squicciarini - Proceedings of the 15th ACM symposium on …, 2010 - dl.acm.org
Cloud computing enables highly scalable services to be easily consumed over the Internet
on an as-needed basis. While cloud computing is expanding rapidly and used by many …

Decentralizing privacy enforcement for Internet of Things smart objects

G Sagirlar, B Carminati, E Ferrari - Computer Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) is now evolving into a loosely coupled, decentralized system
of cooperating smart objects, where high-speed data processing, analytics and shorter …

[HTML][HTML] The logic of XACML

CDPK Ramli, HR Nielson, F Nielson - Science of Computer Programming, 2014 - Elsevier
We study the international standard XACML 3.0 for describing security access control
policies in a compositional way. Our main contributions are (i) to derive a logic that precisely …