Results 171 to 180 of about 7,792 (193)
Some of the next articles are maybe not open access.
ABAC-Based Security Model for DDS
IEEE Transactions on Dependable and Secure Computing, 2022DDS is a middleware standard for data-centric publish/subscribe communication in a large scale real-time environment. DDS provides a security model for secure data communication. A major service of the security model is authorization. The authorization is based on the contents of messages rather than the information about the participant which should ...
Hwimin Kim, Dae-Kyoo Kim, Alaa Alaerjan
openaire +1 more source
On Attribute Retrieval in ABAC
2020Despite the growing interest in Attribute-Based Access Control (ABAC) and the large amount of research devoted to the specification and evaluation of ABAC policies, to date only little work has addressed the issue of attribute management and retrieval. In many modern systems, the attributes needed for policy evaluation are often retrieved from external
Morisset, Charles +2 more
openaire +2 more sources
2020
Chapter 4 examines all of Parker’s complete 32-bar compositions that are in ABAC form. There are only four of these, and one of them (“Ornithology”) is generally credited as a co-composition to Parker and Benny Harris. It is based on the form and harmonies of “How High the Moon” (Hamilton-Lewis).
openaire +1 more source
Chapter 4 examines all of Parker’s complete 32-bar compositions that are in ABAC form. There are only four of these, and one of them (“Ornithology”) is generally credited as a co-composition to Parker and Benny Harris. It is based on the form and harmonies of “How High the Moon” (Hamilton-Lewis).
openaire +1 more source
Mining ABAC Rules from Sparse Logs
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018Different methods have been proposed to mine attribute-based access control (ABAC) rules from logs. In practice, these logs are sparse in that they contain only a fraction of all possible requests. However, for sparse logs, existing methods mine and validate overly permissive rules, enabling privilege abuse. We define a novel measure, reliability, that
Carlos Cotrini +2 more
openaire +1 more source
A Category-Based Model for ABAC
Proceedings of the Third ACM Workshop on Attribute-Based Access Control, 2018In Attribute-Based Access Control (ABAC) systems, access to resources is controlled by evaluating rules against the attributes of the user and the object involved in the access request, as well as the values of the relevant attributes from the environment.
Fernández, Maribel +1 more
openaire +2 more sources
Authorization and Access Control: ABAC
2016GENI’s goal of wide-scale collaboration on infrastructure owned by independent and diverse stakeholders stresses current access control systems to the breaking point. Challenges not well addressed by current systems include, at minimum, support for distributed identity and policy management, correctness and auditability, and approachability.
Ted Faber +2 more
openaire +1 more source
ABAC: Attribute-Based Access Control
2013Cloud storage service allows data owner to outsource their data to the cloud and through which provide the data access to the users. Because the cloud server and the data owner are not in the same trust domain, the semi-trusted cloud server cannot be relied to enforce the access policy. To address this challenge, traditional methods usually require the
Kan Yang, Xiaohua Jia
openaire +1 more source
Introduction to banana, abac� and enset.
2019Banana, abacá and enset belong to the Musaceae family of flowering plants in the order Zingerberales. The family has two genera: Musa and Ensete. Banana and abacá belong to genus Musa and enset to the genus Ensete. This chapter provides information on their taxonomy, morphology, cultivation and trade, as well as on origin and classification of edible ...
Jones, D. R., Daniells, J. W.
openaire +2 more sources
A Systematic Approach to Implementing ABAC
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017In this paper we discuss attribute-based access control (ABAC), and how to proceed with a systematic implementation of ABAC across an enterprise. The paper will cover the different steps needed to be successful.
David Brossard, Gerry Gebel, Mark Berg
openaire +1 more source
Psychometrika, 1948
An abac is computed which gives the probability that at least q% of the whole population will be included in the range of a random sample of given size. Applications are suggested for testing homogeneity of a sampling from a given population.
openaire +1 more source
An abac is computed which gives the probability that at least q% of the whole population will be included in the range of a random sample of given size. Applications are suggested for testing homogeneity of a sampling from a given population.
openaire +1 more source

