TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing [PDF]
In a cloud computing environment, access control policy is an effective means of fortification cloud users and cloud resources services against security infringements. Based on analysis of current cloud computing security characteristics, the preamble of the concept of trust, role-based access control policy, combined with the characteristics of the ...
arxiv +1 more source
Model Checking Access Control Policies: A Case Study using Google Cloud IAM [PDF]
Authoring access control policies is challenging and prone to misconfigurations. Access control policies must be conflict-free. Hence, administrators should identify discrepancies between policy specifications and their intended function to avoid violating security principles.
arxiv
Attributes Enhanced Role-Based Access Control Model [PDF]
. Attribute-based access control (ABAC) and role-based access control (RBAC) are currently the two most popular access con-trol models. Yet, they both have known limitations and offer features complimentary to each other. Due to this fact, integration of
DF Ferraiolo+11 more
core +2 more sources
AKER: A Design and Verification Framework for Safe andSecure SoC Access Control [PDF]
Modern systems on a chip (SoCs) utilize heterogeneous architectures where multiple IP cores have concurrent access to on-chip shared resources. In security-critical applications, IP cores have different privilege levels for accessing shared resources, which must be regulated by an access control system.
arxiv
SAAC: Secure Access Control Management Framework for Multi-User Smart Home Systems
In a smart home environment, multiple users can access a single smart device simultaneously. Moreover, these multiple users may have conflicting demands at a time; that is, one user’s demands differ from another for the same device based on the ...
Iram Fatima Hashmi+5 more
doaj +1 more source
ReportFlow: an application for EEG visualization and reporting using cloud platform
Background The cloud is a promising resource for data sharing and computing. It can optimize several legacy processes involving different units of a company or more companies.
S. Bertuccio+10 more
doaj +1 more source
A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control
Access control is fundamental and prerequisite to govern and safeguard information assets within an organisation. Organisations generally use web enabled remote access coupled with applications access distributed on the various networks facing various ...
Mumina Uddin+2 more
doaj +1 more source
Object-specific Role-based Access Control [PDF]
The proper management of privacy and security constraints in information systems in general and access control in particular constitute a tremendous, but still prevalent challenge.
Mundbrod, Nicolas, Reichert, Manfred
core +1 more source
Dynamic User Role Assignment in Remote Access Control [PDF]
The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand.
Hartel, Pieter+3 more
core +8 more sources
Decentralized Policy Information Points for Multi-Domain Environments [PDF]
Access control models have been developed to control authorized access to sensitive resources. This control of access is important as there is now a need for collaborative resource sharing between multiple organizations over open environments like the internet.
arxiv