Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- abstractDecember 2024
Consent validation for personal data access control using ABAC
LADC '24: Proceedings of the 13th Latin-American Symposium on Dependable and Secure ComputingPages 30–31https://doi.org/10.1145/3697090.3699803To comply with personal data protection regulations, systems that handle personal data must ensure that they verify users’ consent to use their information for a specific purpose. Validating consent is not a simple task, as the purpose typically begins ...
- research-articleNovember 2024
ICDAC: Intelligent Contracts Driven Access Control Model for IoT Device Communication
SN Computer Science (SNCS), Volume 5, Issue 8https://doi.org/10.1007/s42979-024-03406-yAbstractIn the Internet of Things (IoT) epoch, the seamless communication of smart devices through autonomous collaboration demands real-time IoT networks to possess a high level of intelligence. However, the resource-constrained nature of IoT limits the ...
- posterMay 2024
Fine-Grained Authorization in Microservice Architecture: A Decentralized Approach
SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied ComputingPages 1219–1222https://doi.org/10.1145/3605098.3636121Authorization mechanisms are essential for securing microservice-based applications, with Attribute Based Access Control (ABAC) being a prominent choice for fine-grained authorization. A decentralized authorization mechanism allows the transfer of ...
- research-articleMay 2024
ABAC policy mining method based on hierarchical clustering and relationship extraction
Computers and Security (CSEC), Volume 139, Issue Chttps://doi.org/10.1016/j.cose.2024.103717AbstractWith the rapid development of information technology, the traditional access control model has faced challenges in meeting the demands of practical applications. As a result, the ABAC model has emerged as a more flexible and adaptable solution, ...
- research-articleMarch 2024
An extended intuitionistic fuzzy ABAC method for evaluating innovative project ideas
Neural Computing and Applications (NCAA), Volume 36, Issue 16Pages 9375–9404https://doi.org/10.1007/s00521-024-09563-8AbstractThe innovation process typically follows a predefined sequence of phases: idea generation, screening, evaluation/selection, development, and launch/diffusion. This process exhibits a dynamic and cyclic structure. At each stage, potential ideas may ...
-
- research-articleJuly 2024
Hierarchical access control of supply chain data based on blockchain technology
International Journal of Grid and Utility Computing (IJGUC), Volume 15, Issue 3-4Pages 333–342https://doi.org/10.1504/ijguc.2024.140125In order to improve the degree of data sharing between enterprises and departments in the supply chain and strengthen the data access transparency and privacy protection ability, a hierarchical access control mechanism for supply chain data based on ...
- ArticleFebruary 2024
A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation
Information Security and CryptologyPages 141–159https://doi.org/10.1007/978-981-97-0942-7_8AbstractPersonal health records (PHRs) have significant value for health management, accurate diagnosis, and disease research. However, PHR sharing may raise owners’ concerns about security deficiency and privacy leakage. The current mainstream PHR ...
- ArticleMay 2024
Leverage Data Security Policies Complexity for Users: An End-to-End Storage Service Management in the Cloud Based on ABAC Attributes
- Nicolas Greneche,
- Frederic Andres,
- Shihori Tanabe,
- Andreas Pester,
- Hesham H. Ali,
- Amgad A. Mahmoud,
- Dominique Bascle
Machine Learning for NetworkingPages 199–217https://doi.org/10.1007/978-3-031-59933-0_14AbstractThis position paper presents a method to ease the management of data security from the user point of view. Nowadays, users have many ways to access the same data: direct connection to the host, shared filesystem or web drive-like solutions. This ...
- research-articleMay 2024
Structured Literature Review on Access Controls Mechanism in Block Chain Consensus Algorithm: State of Art and Future Direction
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine IntelligenceArticle No.: 114, Pages 1–8https://doi.org/10.1145/3647444.3647941In today's increasingly complex and dynamic environments, traditional access control models often fail to adequately address the diverse requirements and security challenges. Various models have evolved to handle the security issues all dimensions of ...
- ArticleDecember 2023
Towards an Effective Attribute-Based Access Control Model for Neo4j
Model and Data EngineeringPages 352–366https://doi.org/10.1007/978-3-031-49333-1_25AbstractThe graph data model is increasingly used in practice due to its flexibility in modeling complex real-life data. However, some security features (e.g., access control) are not receiving sufficient attention from researchers since that graph ...
- research-articleNovember 2023
AccessChain: An access control framework to protect data access in blockchain enabled supply chain
Future Generation Computer Systems (FGCS), Volume 148, Issue CPages 380–394https://doi.org/10.1016/j.future.2023.06.009AbstractIn recent years, supply chains have evolved into huge ecosystems, demanding trust, provenance, and data privacy. Since blockchain technology (BCT) allows for the development of a distributed environment, it is ideal for supply chain management (...
Highlights- A multi-blockchain data privacy-preserving framework with fine-grained access control.
- Two separate ledgers to store business operations and contracts to maximize scalability.
- The architecture guarantees an efficient, scalable and ...
- research-articleJune 2023
Secure fine grained access control for telecare medical communication system
Telecommunications Systems (TESY), Volume 84, Issue 1Pages 1–21https://doi.org/10.1007/s11235-023-01033-1AbstractModern healthcare institutions are now equipped to provide telecare services because of substantial improvements in telecommunication. Numerous services are provided through the telecare system. For efficient utilization of telecare service, ...
- research-articleJanuary 2023
DACAS: integration of attribute-based access control for northbound interface security in SDN
World Wide Web (WWWJ), Volume 26, Issue 4Pages 2143–2173https://doi.org/10.1007/s11280-022-01130-2AbstractSince Software-Defined Networking (SDN) allows apps to interact with network-critical resources at the control plane through northbound interface, people hope that these apps have the same level of trust as the controller. Most researchers use ...
- ArticleDecember 2022
Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes
Information Systems SecurityPages 84–102https://doi.org/10.1007/978-3-031-23690-7_5AbstractAccess control is one of the key mechanisms used for protecting system resources. While each of the existing access control models has its own benefits, it is difficult to satisfy all the requirements of a contemporary system with a single model. ...
- research-articleNovember 2022
A New Attribute-Based Access Control Model for RDBMS
Cybernetics and Information Technologies (CYBAIT), Volume 22, Issue 4Pages 3–22https://doi.org/10.2478/cait-2022-0036AbstractOne of the challenges in Attribute-Based Access Control (ABAC) implementation is acquiring sufficient metadata against entities and attributes. Intelligent mining and extracting ABAC policies and attributes make ABAC implementation more feasible ...
- research-articleOctober 2022
IoT-Gov: an IoT governance framework using the blockchain
Computing (CMPT), Volume 104, Issue 10Pages 2307–2345https://doi.org/10.1007/s00607-022-01086-1AbstractInternet of Things (IoT) has become an essential technology in different daily life domains including health, industry and finance among many others. The implementation of IoT systems requires different underlying technologies such as applications,...
- research-articleSeptember 2022
Efficient ABAC based information sharing within MQTT environments under emergencies
Computers and Security (CSEC), Volume 120, Issue Chttps://doi.org/10.1016/j.cose.2022.102829AbstractRecent emergencies, such as the COVID-19 pandemic have shown how timely information sharing is essential to promptly and effectively react to emergencies. Internet of Things has magnified the possibility of acquiring information from ...
- research-articleAugust 2022
Improving the attribute retrieval on ABAC using opportunistic caches for Fog-Based IoT Networks
- Bruno Cremonezi,
- Airton Ribeiro Gomes Filho,
- Edelberto Franco Silva,
- José Augusto Miranda Nacif,
- Alex Borges Vieira,
- Michele Nogueira
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 213, Issue Chttps://doi.org/10.1016/j.comnet.2022.109000AbstractAttribute-Based Access Control (ABAC) is one of the most popular and fits access control methods for the Internet of Things (IoT). Yet, despite its popularity, just a few works address the attribute management and retrieval challenges ...
- research-articleJuly 2022
A blockchain-based secure storage and access control scheme for supply chain finance
The Journal of Supercomputing (JSCO), Volume 79, Issue 1Pages 109–138https://doi.org/10.1007/s11227-022-04655-5AbstractSupply chain finance (SCF) provides credit for small and medium-sized enterprises with low credit lines and small financing scales. The resulting financial credit data and related business transaction data are highly confidential and private. ...
- articleJune 2022
A Blockchain-Based Approach for Secure Data Migration From the Cloud to the Decentralized Storage Systems
International Journal of Web Services Research (IJWSR-IGI), Volume 19, Issue 1Pages 1–20https://doi.org/10.4018/IJWSR.296688The use of the Cloud computing has been constantly on the rise. However, there are many challenges associated with the Cloud, such as high bandwidth requirements, data security, vendor lock-in and others. The recent rise of decentralized file systems (...