Have a personal or library account? Click to login
Access Control Models Cover

References

  1. 1. Bell, D., L. LaPadula. Secure Computer Systems: Mathematical Foundations and Model. Bedford, MA, The Mitre Corporation, 1973.
  2. 2. Biba, K. Integrity Considerations for Secure Computer Sytems. – In: Technical Report ESD {TR {76-372, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, April 1977.
  3. 3. Schlegal, M. Poster: Shielding AppSPEAR – Enhancing Memory Safety for Trusted Application-level Security Policy Enforcement. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 99-101. https://doi.org/10.1145/3450569.346439610.1145/3450569.3464396
  4. 4. Claeys, T., F. Rousseau, B. Tourancheau. Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment. – In: Proc. of International Workshop on Secure Internet of Things (SIOT), September 2017, Oslo, Norway. Hal-01596135, 2017, pp. 1-9. DOI: 10.1109/SIoT.2017.00006.10.1109/SIoT.2017.00006
  5. 5. Covington, M., W. Long, S. Srinivasan, A. K. Dey, M. Ahamad, G. D. Abowd. Securing Context-Aware Applications Using Environment Roles. – In: Proc. of 6th ACM Symposium on Access Control Models and Technologies ’01, Chantilly, Virginia, USA, May 2001, pp. 10-20. https://doi.org/10.1145/373256.37325810.1145/373256.373258
  6. 6.Corradi, A., R. Montanari, D. Tibaldi. Context-Based Access Control Management in Ubiquitous Environments. – In: Proc. of 3rd IEEE International Symposium on Network Computing and Applications (NCA’04), Cambridge, MA, USA, 30 August-1 September 2004, pp. 253-260. DOI: 10.1109/NCA.2004.1347784.10.1109/NCA.2004.1347784
  7. 7. Corradi, A., R. Montanari, D. Tibaldi. Context-Based Access Control for Ubiquitous Service Provisioning. – In: Proc. of 28th International Computer Software and Applications Conference (COMPSAC’04), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings. IEEE Computer Society, September 2004, pp. 444-451. DOI:10.1109/CMPSAC.2004.1342877.10.1109/CMPSAC.2004.1342877
  8. 8. Trusted Computer System Evaluation Criteria (TCSEC). Department of Defence, USA, 5200.28-STD, 1983.
  9. 9. Ethelbert, O., F. Moghaddam, P. Wieder, R. Yahyapour. A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications. – In: Proc. of 5th International Conference on Future Internet of Things and Cloud (FiCloud’17), IEEE, 2017, pp. 47-53. DOI: 10.1109/FiCloud.2017.29.10.1109/FiCloud.2017.29
  10. 10. Ferraiolo, D., D. Kuhn, R. Chandramouli. Role-Based Access Control. Second Edition. Artech House, 2007.
  11. 11. Ferraiolo, D., R. Sandhu, S. Gavrila, D. Kuhn, R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. – ACM Transactions on Information and System Security, Vol. 4, August 2001, No 3, pp. 224-274.10.1145/501978.501980
  12. 12. Fong, P., I. Siahaan. Relationship-Based Access Control Policies and Their Policy Languages. UC CPSC Technical Report 2011-990-02, January 2011, pp. 51-60. https://doi.org/10.1145/1998441.199845010.1145/1998441.1998450
  13. 13. Fong, P. Relationship-Based Access Control: Protection Model and Policy Language. – In: Proc. of 1st ACM Conference on Data and Application Security and Privacy, CODASPY’11, San Antonio, Texas, USA, 21-23 February 2011, pp. 191-202. https://doi.org/10.1145/1943513.194353910.1145/1943513.1943539
  14. 14. Harrison, M., W. Ruzzo, J. Ullman. Protection in Operating Systems. – CACM, Vol. 19, August 1976, No 8, pp. 461-471.10.1145/360303.360333
  15. 15. Hu, V., D. Ferraiolo, R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, S. Karen. Guide to Attribute-Based Access Control (ABAC) Definitions and Considerations. – In: NIST Special Publication 800-162, SIN’13, 2014.10.6028/NIST.SP.800-162
  16. 16. Iachello, G., G. Abowd. A Token-Based Access Control Mechanism for Automated Capture and Access Systems in Ubiquitous Computing. – In: GVU Technical Report; GIT-GVU-05-06, 2005. Last access April 2021. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.536.197&rep=rep1&type=pdf
  17. 17. Karp, A., H. Haury, M. Davis. From ABAC to ZBAC: The Evolution of Access Control Models. – HP Laboratories, Technical Report HPL-2009-30, 2009. Last access July 2020. http://www.hpl.hp.com/techreports/2009/HPL-2009-30.pdf
  18. 18. Lampson, B. Dynamic Protection Structures. – In: AFIPS Conference Proceedings, Vol. 35, 1969, pp. 27-38.
  19. 19. Liang, Y. Study on View-Based Security Model for Database [J]. – In: Proc. of Sun Yatsen University Forum, 2005, (03), pp. 134-137.
  20. 20. Lin, J., Y. Fang, B. Chen, L. Wan. View-Based Access Control Mechanism for Spatial Database. – In: Proc. of International Conference on Earth Observation Data Processing and Analysis (ICEODPA), Vol. 7285, 728535, Wuhan, China 2008. https://doi.org/10.1117/12.81556910.1117/12.815569
  21. 21. Nguyen, D., J. Park, R. Sandhu. Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. – In: Proc. of 8th International Conference Network and System Security NSS, 2014, pp 15-27.10.1007/978-3-319-11698-3_2
  22. 22. Osborn, S., R. Sandhu, Q. Munawer. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. – ACM Transactions on Information and System Security, Vol. 3, May 2000, No 2, pp. 85-106.10.1145/354876.354878
  23. 23. Park, J., D. Dguyen, R. Sandhu. A Provenance-Based Access Control Model. – In: Proc. of 10th Annual International Conference on Privacy, Security and Trust (PST’12), IEEE, 2012, pp. 137-144.10.1109/PST.2012.6297930
  24. 24. Ramane, M., B. Vasudevan, S. Allaphan. A Provenance-Policy Based Access Control Model for Data Usage Validation in Cloud. – Cryptography and Security, Vol. 3, October 2014, No 5, pp. 1-9. https://arxiv.org/ftp/arxiv/papers/1411/1411.1933.pdf10.5121/ijsptm.2014.3501
  25. 25. Sandhu, R., E. Coyne, H. Feinstein, C. Youman. Role-Based Access Control Models. – In: IEEE Computer, 1996, pp. 38-47.10.1109/2.485845
  26. 26. Sandhu, R., D. Ferraiolo, R. Kuhn. The NIST Model for Role-Based Access Control: Towards a Unified Standard. – In: Proc. of 5th ACM Workshop on Role-Based Access Control, ACM, 2000, pp. 47-63.
  27. 27. Schläger, C., M. Sojer, B. Muschall, G. Pernul. Attribute-Based Authentication and Authorization Infrastructures for e-Commerce Providers. – In: Proc. of EC-Web, 2006, pp 132-141. https://doi.org/10.1007/11823865_1410.1007/11823865_14
  28. 28.Smirnov, A., A. Kashevnik, N. Shilov, N. Teslya. Context-Based Access Control Model for Smart Space. – In: Proc. of 5th International Conference on Cyber Conflict K. Podins, J. Stinissen, M. Maybaum, Eds. NATO CCD COE Publications, Tallinn, 2013, pp. 1-15.
  29. 29. Rosenthal, A., E. Sciore. Content-Based and View-Based Access Control. – In: H. C. A. Van Tilborg, S. Jajodia, Eds. Encyclopedia of Cryptography and Security, Boston, MA, Springer, 2011, pp. 11-59. https://doi.org/10.1007/978-1-4419-5906-5_69510.1007/978-1-4419-5906-5_695
  30. 30.Tzelepi, S., D. Koukopoulos, G. Pangalos. A Flexible Content and Context-Based Access Control Model for Multimedia Medical Image Database Systems. – In: Proc. of 4th Workshop on Multimedia & Security: New Challenges, MM&Sec 2001, Ottawa, Ontario, Canada, 5 October 2001, pp. 52-55. https://doi.org/10.1145/1232454.123247310.1145/1232454.1232473
  31. 31. Ware, W. Security Controls for Computer Systems (U). – In: Report of Defense Science Board Task Force on Computer Security, Santa Monica, CA: The RAND Corporation, February 1970.
  32. 32. Yan, E., J. Tong. Attributed Based Access Control (ABAC) for Web Services. – In: Proc. of IEEE International Conference on Web Services, ICWS 2005, Washington, DC, USA, IEEE Computer Society, 2005, pp. 561-569.10.1109/ICWS.2005.25
  33. 33. Chen, A., G. Lu, H. Xing, Y. Xie, S. Yuan. Dynamic and Semantic-Aware Access-Control Model for Privacy Preservation in Multiple Data Center Environments. – International Journal of Distributed Sensor Networks 2020, Vol. 16, 2020, No 5. https://doi.org/10.1177/155014772092177810.1177/1550147720921778
  34. 34. Fugkeaw, S. A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing. – In: IEEE Access, Vol. 9, 2021, pp. 836-848. DOI: 10.1109/ACCESS.2020.3046869.10.1109/ACCESS.2020.3046869
  35. 35. Guclu, M., C. Bakir, V. Hakkoymaz. A New Scalable and Expandable Access Control Model for Distributed Database Systems in Data Security. – In: Hindawi Scientific Programming. Vol. 2020. 2020, Article ID 8875069. 10 p. https://doi.org/10.1155/2020/887506910.1155/2020/8875069
  36. 36. InterNational Committee for Information Technology Standards (INCITS). Information Technology – Next Generation Access Control. Implementation Requirements, Protocols and API Definitions. USA, 2017.
  37. 37. Information Technology Laboratory National Institute of Standards and Technology, US. Department of Commerce. Exploring the Next Generation of Access Control Methodologies. ITL Bulletin for November 2016.
  38. 38. Diep, N., L. Hung, Y. Zhung, S. Lee, Y. Lee, H. Lee. Enforcing Access Control Using Risk Assessment. – In: Proc. of 4th European Conference on Universal Multiservice Networks, Toulouse, France, 14-16 February 2007, pp. 419-424.10.1109/ECUMN.2007.19
  39. 39. Atlam, H., M. Azad, M. Alassafi, A. Alshdadi, A. Alenezi. Risk-Based Access Control Model: A Systematic Literature Review. – Future Internet, Vol. 12, 2020, No 6, 103. https://doi.org/10.3390/fi1206010310.3390/fi12060103
  40. 40. Atlam, H., A. Alenezi, R. Walters, G. Wills, J. Daniel. Developing an Adaptive Risk-Based Access Control Model for the Internet of Things. – In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 2017, pp. 655-661. DOI: 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.103.10.1109/iThings-GreenCom-CPSCom-SmartData.2017.103
  41. 41. Aluvalu, R., K. Chennam, A. Jabbar, S. Ahamed. Risk Aware Access Control Model for Trust Based Collaborative Organizations in Cloud. – International Journal of Engineering and Technology (UAE), 2018, pp. 49-52. DOI: 10.14419/ijetv7i4.6.20235.
  42. 42. Dimmock, N., J. Bacon, D. Ingram, K. Moody. Risk Models for Trust-Based Access Control (TBAC). – In: P. Herrmann, V. Issarny, S. Shiu, Eds. Trust Management. iTrust 2005. Lecture Notes in Computer Science. Vol. 3477. 2005, Berlin, Heidelberg, Springer, pp. 364-371. https://doi.org/10.1007/11429760_2510.1007/11429760_25
  43. 43. Thomas, R., R. Sandhu. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. – In: T. Y. Lin, S. Qian, Eds. Database Security XI. IFIP Advances in Information and Communication Technology. Boston, MA, Springer, 1998, pp. 166-181. https://doi.org/10.1007/978-0-387-35285-5_1010.1007/978-0-387-35285-5_10
  44. 44. Zhang, C., Y. Hu, G. Zhang. Task-Role Based Dual System Access Control Model. – International Journal of Computer Science and Network Security IJCSNS, Vol. 6, July 2006, No 7B. Last access April 2021. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.100.4090&rep=rep1&type=pdf
  45. 45. Dong, J., H. Zhu, C. Song, Q. Li, R. Xiao. Task-Oriented Multilevel Cooperative Access Control Scheme for Environment with Virtualization and IoT. – In: Hindawi Wireless Communications and Mobile Computing. Vol. 2018. 2018, Article ID 5938152. 11 p. https://doi.org/10.1155/2018/593815210.1155/2018/5938152
  46. 46. Afonin, S. Performance Evaluation of a Rule-Based Access Control Framework. – In: Proc. of 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO’16), Opatija, Croatia, 2016, pp. 1414-1418. DOI: 10.1109/MIPRO.2016.7522361.10.1109/MIPRO.2016.7522361
  47. 47. Kalam, A., R. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel, G. Trouessin. Organization Based Access Control. – In: Proc. of 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’03), Lake Como, Italy, 2003, pp. 120-131. DOI: 10.1109/POLICY.2003.1206966.10.1109/POLICY.2003.1206966
  48. 48. Wang, B., S. Zhang. An Organization and Task Based Access Control Model for Workflow System. – In: K. C. C. Chang et al., Eds. Advances in Web and Network Technologies, and Information Management. APWeb 2007, WAIM 2007. Lecture Notes in Computer Science. Vol. 4537. Berlin, Heidelberg, Springer, 2007, pp. 485-490. https://doi.org/10.1007/978-3-540-72909-9_5110.1007/978-3-540-72909-9_51
  49. 49. Maesa, D., P. Mori, L. Ricci. Blockchain Based Access Control. – In: L. Chen, H. Reiser, Eds. Distributed Applications and Interoperable Systems (DAIS’17). Lecture Notes in Computer Science. Vol. 10320. Springer, Cham., 2017, pp. 206-220. https://doi.org/10.1007/978-3-319-59665-5_1510.1007/978-3-319-59665-5_15
  50. 50. Abdi, I., F. Eassa, K. Jambi, K. Almarhabi. A. AL-Ghamdi. Blockchain Platforms and Access Control Classification for IoT Systems. – In: Symmetry, Vol. 12, 2020, 1663. https://doi.org/10.3390/sym1210166310.3390/sym12101663
  51. 51. Bindra, L., K. Eng, O. Ardakanian, E. Stroulia. Flexible, Decentralized Access Control for Smart Buildings with Smart Contracts. 2021. Last accessed Mart 2021. https://arxiv.org/pdf/2010.08176v1.pdf10.1080/23335777.2021.1922502
  52. 52. Gupta, R., V. Shukla, S. Rao, S. Anwar, P. Sharma, R. Bathla. Enhancing Privacy through “Smart Contract” Using Blockchain-Based Dynamic Access Control. – In: Proc. of International Conference on Computation, Automation and Knowledge Management (ICCAKM’20), Dubai, United Arab Emirates, 2020, pp. 338-343. DOI: 10.1109/ICCAKM46823.2020.9051521.10.1109/ICCAKM46823.2020.9051521
  53. 53. Dramé-Maigné, S., M. Laurent, L. Castillo, H. Ganem. Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain. – In: Proc. of 14th EAI Int. Conf. Secur. Privacy Commun. Netw. (SECURECOMM’18), Seattle, WA, USA, Springer, Jun 2018, pp. 1-16.10.1007/978-3-030-01701-9_4
  54. 54. Thwin, T., S. Vasupongayya. Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems. – In: Hindawi Security and Communication Networks. Vol. 2019. Article ID 8315614. 15 p. https://doi.org/10.1155/2019/831561410.1155/2019/8315614
  55. 55. Dara, A., A. Loneb, A. Babac, R. Naazb, F. Wuc. Blockchain Driven Access Control Mechanisms, Models and Frameworks: A Systematic Literature Review. Last access Mart 2021. https://eprint.iacr.org/2020/1379.pdf, 2021
  56. 56. Carminati, B., E. Ferrari, A. Perego. Rule-Based Access Control for Social Networks. – In: R. Meersman, Z. Tari, P. Herrero, Eds. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science. Vol. 4278. Berlin, Heidelberg, Springer, 2006, pp. 1734-1744. https://doi.org/10.1007/11915072_8010.1007/11915072_80
  57. 57. Martínez, S., J. García, J. Cabot. Runtime Support for Rule-Based Access-Control Evaluation through Model-Transformation. – In: Proc. of 2016 ACM SIGPLAN International Conference on Software Language Engineering (SLE’16), October 2016, pp. 57-69. https://doi.org/10.1145/2997364.299737510.1145/2997364.2997375
  58. 58. Panende, M., Y. Prayudi, I. Riadi. Comparison of Attribute Based Access Control (ABAC) Model and Rule Based Access (RBAC) to Digital Evidence Storage (DES). – International Journal of Cyber-Security and Digital Forensics, 2018, pp. 275-28210.17781/P002451
  59. 59. Li, H., X. Zhang, H. Wu, Y. Qu. Design and Application of Rule Based Access Control Policies. 2005. Last access Mart 2021. https://www.csee.umbc.edu/csee/research/swpw/papers/zhang.pdf
  60. 60. Abadi, M., C. Fournet. Access Control Based on Execution History. – In: Proc. of NDSS Symposium 2003, 2003. Last access Mart 2021. https://www.ndss-symposium.org/wp-content/uploads/2017/09/Access-Control-Based-on-Execution-History-Martin-Abadi.pdf
  61. 61. Röder, P., O. Tafreschi, C. Eckert. History-Based Access Control and Information Flow Control for Structured Documents. – In: Proc. of 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS’07), March 2007, pp. 386-388. https://doi.org/10.1145/1229285.122933610.1145/1229285.1229336
  62. 62. Banerjee, A., D. Naumann. History-Based Access Control and Secure Information Flow. – In: G. Barthe, L. Burdy, M. Huisman, JL. Lanet, T. Muntean, Eds. Construction and Analysis of Safe, Secure, and Interoperable Smart Devices. CASSIS 2004. Lecture Notes in Computer Science. Vol. 3362. Berlin, Heidelberg, Springer, 2005, pp. 27-48. https://doi.org/10.1007/978-3-540-30569-9_210.1007/978-3-540-30569-9_2
  63. 63. Aftab, M., Y. Munir, A. Oluwasanmi, Z. Qin, M. Aziz, Zakria, N. Son, V. Tran. A Hybrid Access Control Model with Dynamic COI for Secure Localization of Satellite and IoT-Based Vehicles. – IEEE Access, Vol. 8, 2020, pp. 24196-24208. DOI: 10.1109/ACCESS.2020.2969715.10.1109/ACCESS.2020.2969715
  64. 64. Xiaoning, M. Formal Description of Trust-Based Access Control. – In: Proc. of 2012 International Conference on Medical Physics and Biomedical Engineering, Physics Procedia, Vol. 33, 2012, pp. 555-560. ISSN 1875-3892. https://doi.org/10.1016/j.phpro.2012.05.10310.1016/j.phpro.2012.05.103
  65. 65. Bhatti, R., E. Bertino, A. Ghafoor. A Trust-Based Context-Aware Access Control Model for Web-Services. – In: Proc. of IEEE International Conference on Web Services, 2004., San Diego, CA, USA, 2004, pp. 184-191. DOI: 10.1109/ICWS.2004.1314738.10.1109/ICWS.2004.1314738
  66. 66. Dimmock, N., A. Belokosztolszki, D. Eyers, J. Bacon, K. Moody. Using Trust and Risk in Role-Based Access Control Policies. – In: Proc. of 9th ACM Symposium on Access Control Models and Technologies (SACMAT’04), June 2004, pp. 156-162. https://doi.org/10.1145/990036.99006210.1145/990036.990062
  67. 67. Jun, S. A Trust-Game-Based Access Control Model for Cloud Service. – In: Hindawi Mobile Information Systems. Vol. 2020. 2020, Article ID 4651205. 14 p. https://doi.org/10.1155/2020/465120510.1155/2020/4651205
  68. 68. Sun, P. Research on Cloud Computing Service Based on Trust Access Control. – International Journal of Engineering Business Management, Vol. 12, 2020, pp. 1-13. Last access April 2021. https://journals.sagepub.com/doi/pdf/10.1177/184797901989744410.1177/1847979019897444
  69. 69. Fu, B., D. O’Sullivan. User Centric Trust-Based Access Control Management for Ubiquitous Computing Environments. – In: NOMS Workshops 2008 – IEEE Network Operations and Management Symposium Workshops, Salvador, Brazil, 2008, pp. 265-274. DOI: 10.1109/NOMSW.2007.43.10.1109/NOMSW.2007.43
  70. 70. Wang, S., Q. Liu. Trust-Based Access Control in Virtual Learning Community. – In: Integration and Innovation Orient to e-Society, Vol. 2. IFIP International Federation for Information Processing. Vol. 252. Springer-Verlag, US, 2007, pp. 514-520. ISBN 978-0-387-75493-2.10.1007/978-0-387-75494-9_62
  71. 71. Danilescu, M. Modeling Access Control and User Actions Using Trust-Based Access Control Policies. – Journal of Social Sciences, Vol. 3, 2020, No 3, pp. 72-84. ISSN 2587-3490. ESSN 2587-3504.
  72. 72. Asmawi, A., L. Affendey, N. Udzir, R. Mahmod. XTRUST: A Severity-Aware Trust-Based Access Control for Enhancing Security Level of XML Database from Insider Threats. – PalArch’s Journal of Archaeology of Egypt/Egyptology, Vol. 18, 2021, No 3, pp. 444-450. https://archives.palarch.nl/index.php/jae/article/view/5604
  73. 73. Shynu, P., K. Singh. A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment. – Cybernetics and Information Technologies, Vol. 16, 2016, No 1, pp. 19-37.10.1515/cait-2016-0002
  74. 74. Tu, S., S. Niu, M. Li. An Efficient Access Control Scheme for Cloud Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, No 3, pp. 77-90.10.2478/cait-2013-0027
  75. 75. Alshehri, S., R. Raj. Secure Access Control for Health Information Sharing Systems. – In: Proc. of 2013 IEEE International Conference on Healthcare Informatics, Philadelphia, PA, 2013, pp. 277-286. DOI: 10.1109/ICHI.2013.40.10.1109/ICHI.2013.40
  76. 76. Gabillon, A., L. Letouzey. A View-Based Access Control Model for SPARQL. – In: 4th International Conference on Network and System Security (NSS’10), September 2010, Melbourne, Australia, pp.105-112. DOI: 10.1109/NSS.2010.35ff. ffhal-01020253f.
  77. 77. Gan, G., E. Chen, Z. Zhou, Y. Zhu. Token-Based Access Control. – IEEE Access, Vol. 8, 2020, pp. 54189-54199. DOI: 10.1109/ACCESS.2020.2979746.10.1109/ACCESS.2020.2979746
  78. 78. Iachello, G., G. Abowd. A Token-Based Access Control Mechanism for Automated Capture and Access Systems in Ubiquitous Computing, 2005. Last access April 2021. https://smartech.gatech.edu/bitstream/handle/1853/4482/05-06.pdf?sequence=1&isAllowed=y
  79. 79. Bethencourt, J., A. Sahai, B. Waters. Ciphertext-Policy Attribute-Based Encryption. – In: 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, CA, USA, 2007, pp. 321-334. DOI: 10.1109/SP.2007.11.10.1109/SP.2007.11
  80. 80. Thomas, R., R. Sandhu. Chapter 10. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. – Database Security XI, 1998, Published by Chapman & Hall, pp. 166-181.10.1007/978-0-387-35285-5_10
  81. 81. Thwin, T., S. Vasupongayya. Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems. – In: Security and Communication Networks, January 2019. https://doi.org/10.1155/2019/831561410.1155/2019/8315614
  82. 82. Sandhu, R., J. Park. Usage Control: A Vision for Next Generation Access Control. – In: MMM-ACNS 2003, Berlin, Heidelberg, Springer-Verlag, LNCS 2776, 2003, pp. 17-31.
  83. 83. Thomas, R., R. Sandhu. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. – In: Proc. of IFIP WG11.3 Workshop on Database Security, Lake Tahoe, California, 11-13 August 1997. DOI: 10.1007/978-0-387-35285-5_10 Source: DBLP. http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=174015A71B4347DEF3193901D5353958?doi=10.1.1.54.6227&rep=rep1&type=pdf, last access April 2021
  84. 84. Heutelbeck, D., M. Baur, M. Kluba. In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 59-70. https://doi.org/10.1145/3450569.346356210.1145/3450569.3463562
  85. 85. Koshutanski, H., F. Martinelli, P. Mori, A. Vaccarelli. H. Fine-Grained and History-Based Access Control with Trust Management for Autonomic Grid Services. – In: Proc. of International Conference on Autonomic and Autonomous Systems (ICAS’06), Silicon Valley, CA, USA, 2006, pp. 34-34. DOI: 10.1109/ICAS.2006.25.10.1109/ICAS.2006.25
  86. 86. Ravari, A., J. Jafarian, M. Amini, R. Jalili. GTHBAC: A Generalized Temporal History Based Access Control Model. – Telecommun Syst, Vol. 45, 2010, pp. 111-125. DOI 10.1007/s11235-009-9239-9.10.1007/s11235-009-9239-9
  87. 87. Edjlali, G., A. Acharya, V. Chaudhary. History-Based Access Control for Mobile Code. – In: J. Vitek, C. D. Jensen, Eds. Secure Internet Programming. Lecture Notes in Computer Science. Vol 1603. Springer, Berlin, Heidelberg, 1999, pp. 413-431. https://doi.org/10.1007/3-540-48749-2_1910.1007/3-540-48749-2_19
  88. 88. Brose, G. A View-Based Access Control Model for CORBA. – In: J. Vitek, C. D. Jensen, Eds. Secure Internet Programming. Lecture Notes in Computer Science. Vol. 1603. Springer, Berlin, Heidelberg, pp. 237-252, https://doi.org/10.1007/3-540-48749-2_1010.1007/3-540-48749-2_10
  89. 89. Masoumzadeh, A., P. Narendran, P. Iyer. Towards a Theory for Semantics and Expressiveness Analysis of Rule-Based Access Control Models. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 33-43. https://doi.org/10.1145/3450569.346356910.1145/3450569.3463569
  90. 90. Chen, E., V. Dubrovenski, D. Xu. Mutation Analysis of NGAC Policies. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 71-82. https://doi.org/10.1145/3450569.346356310.1145/3450569.3463563
  91. 91. Jacob, F., L. Becker, J. Grashöfer, H. Hartenstein. Matrix Decomposition: Analysis of an Access Control Approach on Transaction-Based DAGs without Finality. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 81-92. https://doi.org/10.1145/3381991.339539910.1145/3381991.3395399
  92. 92. Enck, W. Analysis of Access Control Enforcement in Android. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 117-118. https://doi.org/10.1145/3381991.339539610.1145/3381991.3395396
  93. 93. Radhika, B., N. Narendra Kumar, R. Shyamasundar. Towards Unifying RBAC with Information Flow Control. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 45-54. https://doi.org/10.1145/3450569.346357010.1145/3450569.3463570
  94. 94. Al-Lail, M. Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control Decisions. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 55-57. https://doi.org/10.1145/3450569.346439510.1145/3450569.3464395
  95. 95. Xu, S., J. Ning, J. Ma, X. Huang, H. Pang, R. Deng. Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 143-154. https://doi.org/10.1145/3450569.346356110.1145/3450569.3463561
  96. 96. Gupta, M., R. Sandhu. Towards Activity-Centric Access Control for Smart Collaborative Ecosystems. – In: Proc of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 155-164. https://doi.org/10.1145/3450569.346355910.1145/3450569.3463559
  97. 97. Ulusoy, O., P. Yolum. Norm-Based Access Control. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 35-46. https://doi.org/10.1145/3381991.339560110.1145/3381991.3395601
  98. 98. Rosa, M., F. Cerbo, R. Lozoya. Declarative Access Control for Aggregations of Multiple Ownership Data. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 59-70. https://doi.org/10.1145/3381991.339560910.1145/3381991.3395609
  99. 99. Momen, N., S. Bock, L. Fritcsch. Accept - Maybe - Decline: Introducing Partial Consent for the Permission-Based Access Control Model of Android. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 71-80. https://doi.org/10.1145/3381991.339560310.1145/3381991.3395603
  100. 100. Heutelbeck, D. Demo: Attribute-Stream-Based Access Control (ASBAC) with the Streaming Attribute Policy Language (SAPL). – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 95-97. https://doi.org/10.1145/3450569.346439710.1145/3450569.3464397
  101. 101. Crampton, J., E. Eiben, G. Gutin, D. Karapetyan, D. Majumdar. Valued Authorization Policy Existence Problem. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 83-94. https://doi.org/10.1145/3450569.346357110.1145/3450569.3463571
  102. 102. Gazzarata, G, B. Blobel. Access Control Models – A Systematic Review. – Studies in Health Technology and Informatics, Vol. 261, 2019, pp. 246-252. DOI:10.3233/978-1-61499-975-1-246.
  103. 103. Zhang, Y., A. Memariani, N. Bidikar. A Review on Blockchain-Based Access Control Models in IoT Applications. – In: 16th IEEE International Conference on Control & Automation (ICCA’20), 2020, pp. 671-676. DOI: 10.1109/ICCA51439.2020.9264499.10.1109/ICCA51439.2020.9264499
  104. 104. Alnefaie, S., S. Alshehri, A. Cherif. A Survey on Access Control in IoT: Models, Architectures and Research Opportunities. – International Journal of Security and Networks (IJSN), Vol. 16, 2021, No 1, pp. 60-76.10.1504/IJSN.2021.112837
DOI: https://doi.org/10.2478/cait-2021-0044 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 77 - 104
Submitted on: Jan 3, 2021
Accepted on: Sep 17, 2021
Published on: Dec 9, 2021
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2021 Maria Penelova, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.