References
- 1. Bell, D., L. LaPadula. Secure Computer Systems: Mathematical Foundations and Model. Bedford, MA, The Mitre Corporation, 1973.
- 2. Biba, K. Integrity Considerations for Secure Computer Sytems. – In: Technical Report ESD {TR {76-372, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, April 1977.
- 3. Schlegal, M. Poster: Shielding AppSPEAR – Enhancing Memory Safety for Trusted Application-level Security Policy Enforcement. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 99-101. https://doi.org/10.1145/3450569.346439610.1145/3450569.3464396
- 4. Claeys, T., F. Rousseau, B. Tourancheau. Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment. – In: Proc. of International Workshop on Secure Internet of Things (SIOT), September 2017, Oslo, Norway. Hal-01596135, 2017, pp. 1-9. DOI: 10.1109/SIoT.2017.00006.10.1109/SIoT.2017.00006
- 5. Covington, M., W. Long, S. Srinivasan, A. K. Dey, M. Ahamad, G. D. Abowd. Securing Context-Aware Applications Using Environment Roles. – In: Proc. of 6th ACM Symposium on Access Control Models and Technologies ’01, Chantilly, Virginia, USA, May 2001, pp. 10-20. https://doi.org/10.1145/373256.37325810.1145/373256.373258
- 6.Corradi, A., R. Montanari, D. Tibaldi. Context-Based Access Control Management in Ubiquitous Environments. – In: Proc. of 3rd IEEE International Symposium on Network Computing and Applications (NCA’04), Cambridge, MA, USA, 30 August-1 September 2004, pp. 253-260. DOI: 10.1109/NCA.2004.1347784.10.1109/NCA.2004.1347784
- 7. Corradi, A., R. Montanari, D. Tibaldi. Context-Based Access Control for Ubiquitous Service Provisioning. – In: Proc. of 28th International Computer Software and Applications Conference (COMPSAC’04), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings. IEEE Computer Society, September 2004, pp. 444-451. DOI:10.1109/CMPSAC.2004.1342877.10.1109/CMPSAC.2004.1342877
- 8. Trusted Computer System Evaluation Criteria (TCSEC). Department of Defence, USA, 5200.28-STD, 1983.
- 9. Ethelbert, O., F. Moghaddam, P. Wieder, R. Yahyapour. A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications. – In: Proc. of 5th International Conference on Future Internet of Things and Cloud (FiCloud’17), IEEE, 2017, pp. 47-53. DOI: 10.1109/FiCloud.2017.29.10.1109/FiCloud.2017.29
- 10. Ferraiolo, D., D. Kuhn, R. Chandramouli. Role-Based Access Control. Second Edition. Artech House, 2007.
- 11. Ferraiolo, D., R. Sandhu, S. Gavrila, D. Kuhn, R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. – ACM Transactions on Information and System Security, Vol. 4, August 2001, No 3, pp. 224-274.10.1145/501978.501980
- 12. Fong, P., I. Siahaan. Relationship-Based Access Control Policies and Their Policy Languages. UC CPSC Technical Report 2011-990-02, January 2011, pp. 51-60. https://doi.org/10.1145/1998441.199845010.1145/1998441.1998450
- 13. Fong, P. Relationship-Based Access Control: Protection Model and Policy Language. – In: Proc. of 1st ACM Conference on Data and Application Security and Privacy, CODASPY’11, San Antonio, Texas, USA, 21-23 February 2011, pp. 191-202. https://doi.org/10.1145/1943513.194353910.1145/1943513.1943539
- 14. Harrison, M., W. Ruzzo, J. Ullman. Protection in Operating Systems. – CACM, Vol. 19, August 1976, No 8, pp. 461-471.10.1145/360303.360333
- 15. Hu, V., D. Ferraiolo, R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, S. Karen. Guide to Attribute-Based Access Control (ABAC) Definitions and Considerations. – In: NIST Special Publication 800-162, SIN’13, 2014.10.6028/NIST.SP.800-162
- 16. Iachello, G., G. Abowd. A Token-Based Access Control Mechanism for Automated Capture and Access Systems in Ubiquitous Computing. – In: GVU Technical Report; GIT-GVU-05-06, 2005. Last access April 2021. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.536.197&rep=rep1&type=pdf
- 17. Karp, A., H. Haury, M. Davis. From ABAC to ZBAC: The Evolution of Access Control Models. – HP Laboratories, Technical Report HPL-2009-30, 2009. Last access July 2020. http://www.hpl.hp.com/techreports/2009/HPL-2009-30.pdf
- 18. Lampson, B. Dynamic Protection Structures. – In: AFIPS Conference Proceedings, Vol. 35, 1969, pp. 27-38.
- 19. Liang, Y. Study on View-Based Security Model for Database [J]. – In: Proc. of Sun Yatsen University Forum, 2005, (03), pp. 134-137.
- 20. Lin, J., Y. Fang, B. Chen, L. Wan. View-Based Access Control Mechanism for Spatial Database. – In: Proc. of International Conference on Earth Observation Data Processing and Analysis (ICEODPA), Vol. 7285, 728535, Wuhan, China 2008. https://doi.org/10.1117/12.81556910.1117/12.815569
- 21. Nguyen, D., J. Park, R. Sandhu. Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. – In: Proc. of 8th International Conference Network and System Security NSS, 2014, pp 15-27.10.1007/978-3-319-11698-3_2
- 22. Osborn, S., R. Sandhu, Q. Munawer. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. – ACM Transactions on Information and System Security, Vol. 3, May 2000, No 2, pp. 85-106.10.1145/354876.354878
- 23. Park, J., D. Dguyen, R. Sandhu. A Provenance-Based Access Control Model. – In: Proc. of 10th Annual International Conference on Privacy, Security and Trust (PST’12), IEEE, 2012, pp. 137-144.10.1109/PST.2012.6297930
- 24. Ramane, M., B. Vasudevan, S. Allaphan. A Provenance-Policy Based Access Control Model for Data Usage Validation in Cloud. – Cryptography and Security, Vol. 3, October 2014, No 5, pp. 1-9. https://arxiv.org/ftp/arxiv/papers/1411/1411.1933.pdf10.5121/ijsptm.2014.3501
- 25. Sandhu, R., E. Coyne, H. Feinstein, C. Youman. Role-Based Access Control Models. – In: IEEE Computer, 1996, pp. 38-47.10.1109/2.485845
- 26. Sandhu, R., D. Ferraiolo, R. Kuhn. The NIST Model for Role-Based Access Control: Towards a Unified Standard. – In: Proc. of 5th ACM Workshop on Role-Based Access Control, ACM, 2000, pp. 47-63.
- 27. Schläger, C., M. Sojer, B. Muschall, G. Pernul. Attribute-Based Authentication and Authorization Infrastructures for e-Commerce Providers. – In: Proc. of EC-Web, 2006, pp 132-141. https://doi.org/10.1007/11823865_1410.1007/11823865_14
- 28.Smirnov, A., A. Kashevnik, N. Shilov, N. Teslya. Context-Based Access Control Model for Smart Space. – In: Proc. of 5th International Conference on Cyber Conflict K. Podins, J. Stinissen, M. Maybaum, Eds. NATO CCD COE Publications, Tallinn, 2013, pp. 1-15.
- 29. Rosenthal, A., E. Sciore. Content-Based and View-Based Access Control. – In: H. C. A. Van Tilborg, S. Jajodia, Eds. Encyclopedia of Cryptography and Security, Boston, MA, Springer, 2011, pp. 11-59. https://doi.org/10.1007/978-1-4419-5906-5_69510.1007/978-1-4419-5906-5_695
- 30.Tzelepi, S., D. Koukopoulos, G. Pangalos. A Flexible Content and Context-Based Access Control Model for Multimedia Medical Image Database Systems. – In: Proc. of 4th Workshop on Multimedia & Security: New Challenges, MM&Sec 2001, Ottawa, Ontario, Canada, 5 October 2001, pp. 52-55. https://doi.org/10.1145/1232454.123247310.1145/1232454.1232473
- 31. Ware, W. Security Controls for Computer Systems (U). – In: Report of Defense Science Board Task Force on Computer Security, Santa Monica, CA: The RAND Corporation, February 1970.
- 32. Yan, E., J. Tong. Attributed Based Access Control (ABAC) for Web Services. – In: Proc. of IEEE International Conference on Web Services, ICWS 2005, Washington, DC, USA, IEEE Computer Society, 2005, pp. 561-569.10.1109/ICWS.2005.25
- 33. Chen, A., G. Lu, H. Xing, Y. Xie, S. Yuan. Dynamic and Semantic-Aware Access-Control Model for Privacy Preservation in Multiple Data Center Environments. – International Journal of Distributed Sensor Networks 2020, Vol. 16, 2020, No 5. https://doi.org/10.1177/155014772092177810.1177/1550147720921778
- 34. Fugkeaw, S. A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing. – In: IEEE Access, Vol. 9, 2021, pp. 836-848. DOI: 10.1109/ACCESS.2020.3046869.10.1109/ACCESS.2020.3046869
- 35. Guclu, M., C. Bakir, V. Hakkoymaz. A New Scalable and Expandable Access Control Model for Distributed Database Systems in Data Security. – In: Hindawi Scientific Programming. Vol. 2020. 2020, Article ID 8875069. 10 p. https://doi.org/10.1155/2020/887506910.1155/2020/8875069
- 36. InterNational Committee for Information Technology Standards (INCITS). Information Technology – Next Generation Access Control. Implementation Requirements, Protocols and API Definitions. USA, 2017.
- 37. Information Technology Laboratory National Institute of Standards and Technology, US. Department of Commerce. Exploring the Next Generation of Access Control Methodologies. ITL Bulletin for November 2016.
- 38. Diep, N., L. Hung, Y. Zhung, S. Lee, Y. Lee, H. Lee. Enforcing Access Control Using Risk Assessment. – In: Proc. of 4th European Conference on Universal Multiservice Networks, Toulouse, France, 14-16 February 2007, pp. 419-424.10.1109/ECUMN.2007.19
- 39. Atlam, H., M. Azad, M. Alassafi, A. Alshdadi, A. Alenezi. Risk-Based Access Control Model: A Systematic Literature Review. – Future Internet, Vol. 12, 2020, No 6, 103. https://doi.org/10.3390/fi1206010310.3390/fi12060103
- 40. Atlam, H., A. Alenezi, R. Walters, G. Wills, J. Daniel. Developing an Adaptive Risk-Based Access Control Model for the Internet of Things. – In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 2017, pp. 655-661. DOI: 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.103.10.1109/iThings-GreenCom-CPSCom-SmartData.2017.103
- 41. Aluvalu, R., K. Chennam, A. Jabbar, S. Ahamed. Risk Aware Access Control Model for Trust Based Collaborative Organizations in Cloud. – International Journal of Engineering and Technology (UAE), 2018, pp. 49-52. DOI: 10.14419/ijetv7i4.6.20235.
- 42. Dimmock, N., J. Bacon, D. Ingram, K. Moody. Risk Models for Trust-Based Access Control (TBAC). – In: P. Herrmann, V. Issarny, S. Shiu, Eds. Trust Management. iTrust 2005. Lecture Notes in Computer Science. Vol. 3477. 2005, Berlin, Heidelberg, Springer, pp. 364-371. https://doi.org/10.1007/11429760_2510.1007/11429760_25
- 43. Thomas, R., R. Sandhu. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. – In: T. Y. Lin, S. Qian, Eds. Database Security XI. IFIP Advances in Information and Communication Technology. Boston, MA, Springer, 1998, pp. 166-181. https://doi.org/10.1007/978-0-387-35285-5_1010.1007/978-0-387-35285-5_10
- 44. Zhang, C., Y. Hu, G. Zhang. Task-Role Based Dual System Access Control Model. – International Journal of Computer Science and Network Security IJCSNS, Vol. 6, July 2006, No 7B. Last access April 2021. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.100.4090&rep=rep1&type=pdf
- 45. Dong, J., H. Zhu, C. Song, Q. Li, R. Xiao. Task-Oriented Multilevel Cooperative Access Control Scheme for Environment with Virtualization and IoT. – In: Hindawi Wireless Communications and Mobile Computing. Vol. 2018. 2018, Article ID 5938152. 11 p. https://doi.org/10.1155/2018/593815210.1155/2018/5938152
- 46. Afonin, S. Performance Evaluation of a Rule-Based Access Control Framework. – In: Proc. of 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO’16), Opatija, Croatia, 2016, pp. 1414-1418. DOI: 10.1109/MIPRO.2016.7522361.10.1109/MIPRO.2016.7522361
- 47. Kalam, A., R. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel, G. Trouessin. Organization Based Access Control. – In: Proc. of 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’03), Lake Como, Italy, 2003, pp. 120-131. DOI: 10.1109/POLICY.2003.1206966.10.1109/POLICY.2003.1206966
- 48. Wang, B., S. Zhang. An Organization and Task Based Access Control Model for Workflow System. – In: K. C. C. Chang et al., Eds. Advances in Web and Network Technologies, and Information Management. APWeb 2007, WAIM 2007. Lecture Notes in Computer Science. Vol. 4537. Berlin, Heidelberg, Springer, 2007, pp. 485-490. https://doi.org/10.1007/978-3-540-72909-9_5110.1007/978-3-540-72909-9_51
- 49. Maesa, D., P. Mori, L. Ricci. Blockchain Based Access Control. – In: L. Chen, H. Reiser, Eds. Distributed Applications and Interoperable Systems (DAIS’17). Lecture Notes in Computer Science. Vol. 10320. Springer, Cham., 2017, pp. 206-220. https://doi.org/10.1007/978-3-319-59665-5_1510.1007/978-3-319-59665-5_15
- 50. Abdi, I., F. Eassa, K. Jambi, K. Almarhabi. A. AL-Ghamdi. Blockchain Platforms and Access Control Classification for IoT Systems. – In: Symmetry, Vol. 12, 2020, 1663. https://doi.org/10.3390/sym1210166310.3390/sym12101663
- 51. Bindra, L., K. Eng, O. Ardakanian, E. Stroulia. Flexible, Decentralized Access Control for Smart Buildings with Smart Contracts. 2021. Last accessed Mart 2021. https://arxiv.org/pdf/2010.08176v1.pdf10.1080/23335777.2021.1922502
- 52. Gupta, R., V. Shukla, S. Rao, S. Anwar, P. Sharma, R. Bathla. Enhancing Privacy through “Smart Contract” Using Blockchain-Based Dynamic Access Control. – In: Proc. of International Conference on Computation, Automation and Knowledge Management (ICCAKM’20), Dubai, United Arab Emirates, 2020, pp. 338-343. DOI: 10.1109/ICCAKM46823.2020.9051521.10.1109/ICCAKM46823.2020.9051521
- 53. Dramé-Maigné, S., M. Laurent, L. Castillo, H. Ganem. Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain. – In: Proc. of 14th EAI Int. Conf. Secur. Privacy Commun. Netw. (SECURECOMM’18), Seattle, WA, USA, Springer, Jun 2018, pp. 1-16.10.1007/978-3-030-01701-9_4
- 54. Thwin, T., S. Vasupongayya. Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems. – In: Hindawi Security and Communication Networks. Vol. 2019. Article ID 8315614. 15 p. https://doi.org/10.1155/2019/831561410.1155/2019/8315614
- 55. Dara, A., A. Loneb, A. Babac, R. Naazb, F. Wuc. Blockchain Driven Access Control Mechanisms, Models and Frameworks: A Systematic Literature Review. Last access Mart 2021. https://eprint.iacr.org/2020/1379.pdf, 2021
- 56. Carminati, B., E. Ferrari, A. Perego. Rule-Based Access Control for Social Networks. – In: R. Meersman, Z. Tari, P. Herrero, Eds. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science. Vol. 4278. Berlin, Heidelberg, Springer, 2006, pp. 1734-1744. https://doi.org/10.1007/11915072_8010.1007/11915072_80
- 57. Martínez, S., J. García, J. Cabot. Runtime Support for Rule-Based Access-Control Evaluation through Model-Transformation. – In: Proc. of 2016 ACM SIGPLAN International Conference on Software Language Engineering (SLE’16), October 2016, pp. 57-69. https://doi.org/10.1145/2997364.299737510.1145/2997364.2997375
- 58. Panende, M., Y. Prayudi, I. Riadi. Comparison of Attribute Based Access Control (ABAC) Model and Rule Based Access (RBAC) to Digital Evidence Storage (DES). – International Journal of Cyber-Security and Digital Forensics, 2018, pp. 275-28210.17781/P002451
- 59. Li, H., X. Zhang, H. Wu, Y. Qu. Design and Application of Rule Based Access Control Policies. 2005. Last access Mart 2021. https://www.csee.umbc.edu/csee/research/swpw/papers/zhang.pdf
- 60. Abadi, M., C. Fournet. Access Control Based on Execution History. – In: Proc. of NDSS Symposium 2003, 2003. Last access Mart 2021. https://www.ndss-symposium.org/wp-content/uploads/2017/09/Access-Control-Based-on-Execution-History-Martin-Abadi.pdf
- 61. Röder, P., O. Tafreschi, C. Eckert. History-Based Access Control and Information Flow Control for Structured Documents. – In: Proc. of 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS’07), March 2007, pp. 386-388. https://doi.org/10.1145/1229285.122933610.1145/1229285.1229336
- 62. Banerjee, A., D. Naumann. History-Based Access Control and Secure Information Flow. – In: G. Barthe, L. Burdy, M. Huisman, JL. Lanet, T. Muntean, Eds. Construction and Analysis of Safe, Secure, and Interoperable Smart Devices. CASSIS 2004. Lecture Notes in Computer Science. Vol. 3362. Berlin, Heidelberg, Springer, 2005, pp. 27-48. https://doi.org/10.1007/978-3-540-30569-9_210.1007/978-3-540-30569-9_2
- 63. Aftab, M., Y. Munir, A. Oluwasanmi, Z. Qin, M. Aziz, Zakria, N. Son, V. Tran. A Hybrid Access Control Model with Dynamic COI for Secure Localization of Satellite and IoT-Based Vehicles. – IEEE Access, Vol. 8, 2020, pp. 24196-24208. DOI: 10.1109/ACCESS.2020.2969715.10.1109/ACCESS.2020.2969715
- 64. Xiaoning, M. Formal Description of Trust-Based Access Control. – In: Proc. of 2012 International Conference on Medical Physics and Biomedical Engineering, Physics Procedia, Vol. 33, 2012, pp. 555-560. ISSN 1875-3892. https://doi.org/10.1016/j.phpro.2012.05.10310.1016/j.phpro.2012.05.103
- 65. Bhatti, R., E. Bertino, A. Ghafoor. A Trust-Based Context-Aware Access Control Model for Web-Services. – In: Proc. of IEEE International Conference on Web Services, 2004., San Diego, CA, USA, 2004, pp. 184-191. DOI: 10.1109/ICWS.2004.1314738.10.1109/ICWS.2004.1314738
- 66. Dimmock, N., A. Belokosztolszki, D. Eyers, J. Bacon, K. Moody. Using Trust and Risk in Role-Based Access Control Policies. – In: Proc. of 9th ACM Symposium on Access Control Models and Technologies (SACMAT’04), June 2004, pp. 156-162. https://doi.org/10.1145/990036.99006210.1145/990036.990062
- 67. Jun, S. A Trust-Game-Based Access Control Model for Cloud Service. – In: Hindawi Mobile Information Systems. Vol. 2020. 2020, Article ID 4651205. 14 p. https://doi.org/10.1155/2020/465120510.1155/2020/4651205
- 68. Sun, P. Research on Cloud Computing Service Based on Trust Access Control. – International Journal of Engineering Business Management, Vol. 12, 2020, pp. 1-13. Last access April 2021. https://journals.sagepub.com/doi/pdf/10.1177/184797901989744410.1177/1847979019897444
- 69. Fu, B., D. O’Sullivan. User Centric Trust-Based Access Control Management for Ubiquitous Computing Environments. – In: NOMS Workshops 2008 – IEEE Network Operations and Management Symposium Workshops, Salvador, Brazil, 2008, pp. 265-274. DOI: 10.1109/NOMSW.2007.43.10.1109/NOMSW.2007.43
- 70. Wang, S., Q. Liu. Trust-Based Access Control in Virtual Learning Community. – In: Integration and Innovation Orient to e-Society, Vol. 2. IFIP International Federation for Information Processing. Vol. 252. Springer-Verlag, US, 2007, pp. 514-520. ISBN 978-0-387-75493-2.10.1007/978-0-387-75494-9_62
- 71. Danilescu, M. Modeling Access Control and User Actions Using Trust-Based Access Control Policies. – Journal of Social Sciences, Vol. 3, 2020, No 3, pp. 72-84. ISSN 2587-3490. ESSN 2587-3504.
- 72. Asmawi, A., L. Affendey, N. Udzir, R. Mahmod. XTRUST: A Severity-Aware Trust-Based Access Control for Enhancing Security Level of XML Database from Insider Threats. – PalArch’s Journal of Archaeology of Egypt/Egyptology, Vol. 18, 2021, No 3, pp. 444-450. https://archives.palarch.nl/index.php/jae/article/view/5604
- 73. Shynu, P., K. Singh. A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment. – Cybernetics and Information Technologies, Vol. 16, 2016, No 1, pp. 19-37.10.1515/cait-2016-0002
- 74. Tu, S., S. Niu, M. Li. An Efficient Access Control Scheme for Cloud Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, No 3, pp. 77-90.10.2478/cait-2013-0027
- 75. Alshehri, S., R. Raj. Secure Access Control for Health Information Sharing Systems. – In: Proc. of 2013 IEEE International Conference on Healthcare Informatics, Philadelphia, PA, 2013, pp. 277-286. DOI: 10.1109/ICHI.2013.40.10.1109/ICHI.2013.40
- 76. Gabillon, A., L. Letouzey. A View-Based Access Control Model for SPARQL. – In: 4th International Conference on Network and System Security (NSS’10), September 2010, Melbourne, Australia, pp.105-112. DOI: 10.1109/NSS.2010.35ff. ffhal-01020253f.
- 77. Gan, G., E. Chen, Z. Zhou, Y. Zhu. Token-Based Access Control. – IEEE Access, Vol. 8, 2020, pp. 54189-54199. DOI: 10.1109/ACCESS.2020.2979746.10.1109/ACCESS.2020.2979746
- 78. Iachello, G., G. Abowd. A Token-Based Access Control Mechanism for Automated Capture and Access Systems in Ubiquitous Computing, 2005. Last access April 2021. https://smartech.gatech.edu/bitstream/handle/1853/4482/05-06.pdf?sequence=1&isAllowed=y
- 79. Bethencourt, J., A. Sahai, B. Waters. Ciphertext-Policy Attribute-Based Encryption. – In: 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, CA, USA, 2007, pp. 321-334. DOI: 10.1109/SP.2007.11.10.1109/SP.2007.11
- 80. Thomas, R., R. Sandhu. Chapter 10. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. – Database Security XI, 1998, Published by Chapman & Hall, pp. 166-181.10.1007/978-0-387-35285-5_10
- 81. Thwin, T., S. Vasupongayya. Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems. – In: Security and Communication Networks, January 2019. https://doi.org/10.1155/2019/831561410.1155/2019/8315614
- 82. Sandhu, R., J. Park. Usage Control: A Vision for Next Generation Access Control. – In: MMM-ACNS 2003, Berlin, Heidelberg, Springer-Verlag, LNCS 2776, 2003, pp. 17-31.
- 83. Thomas, R., R. Sandhu. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. – In: Proc. of IFIP WG11.3 Workshop on Database Security, Lake Tahoe, California, 11-13 August 1997. DOI: 10.1007/978-0-387-35285-5_10 Source: DBLP. http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=174015A71B4347DEF3193901D5353958?doi=10.1.1.54.6227&rep=rep1&type=pdf, last access April 2021
- 84. Heutelbeck, D., M. Baur, M. Kluba. In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 59-70. https://doi.org/10.1145/3450569.346356210.1145/3450569.3463562
- 85. Koshutanski, H., F. Martinelli, P. Mori, A. Vaccarelli. H. Fine-Grained and History-Based Access Control with Trust Management for Autonomic Grid Services. – In: Proc. of International Conference on Autonomic and Autonomous Systems (ICAS’06), Silicon Valley, CA, USA, 2006, pp. 34-34. DOI: 10.1109/ICAS.2006.25.10.1109/ICAS.2006.25
- 86. Ravari, A., J. Jafarian, M. Amini, R. Jalili. GTHBAC: A Generalized Temporal History Based Access Control Model. – Telecommun Syst, Vol. 45, 2010, pp. 111-125. DOI 10.1007/s11235-009-9239-9.10.1007/s11235-009-9239-9
- 87. Edjlali, G., A. Acharya, V. Chaudhary. History-Based Access Control for Mobile Code. – In: J. Vitek, C. D. Jensen, Eds. Secure Internet Programming. Lecture Notes in Computer Science. Vol 1603. Springer, Berlin, Heidelberg, 1999, pp. 413-431. https://doi.org/10.1007/3-540-48749-2_1910.1007/3-540-48749-2_19
- 88. Brose, G. A View-Based Access Control Model for CORBA. – In: J. Vitek, C. D. Jensen, Eds. Secure Internet Programming. Lecture Notes in Computer Science. Vol. 1603. Springer, Berlin, Heidelberg, pp. 237-252, https://doi.org/10.1007/3-540-48749-2_1010.1007/3-540-48749-2_10
- 89. Masoumzadeh, A., P. Narendran, P. Iyer. Towards a Theory for Semantics and Expressiveness Analysis of Rule-Based Access Control Models. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 33-43. https://doi.org/10.1145/3450569.346356910.1145/3450569.3463569
- 90. Chen, E., V. Dubrovenski, D. Xu. Mutation Analysis of NGAC Policies. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 71-82. https://doi.org/10.1145/3450569.346356310.1145/3450569.3463563
- 91. Jacob, F., L. Becker, J. Grashöfer, H. Hartenstein. Matrix Decomposition: Analysis of an Access Control Approach on Transaction-Based DAGs without Finality. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 81-92. https://doi.org/10.1145/3381991.339539910.1145/3381991.3395399
- 92. Enck, W. Analysis of Access Control Enforcement in Android. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 117-118. https://doi.org/10.1145/3381991.339539610.1145/3381991.3395396
- 93. Radhika, B., N. Narendra Kumar, R. Shyamasundar. Towards Unifying RBAC with Information Flow Control. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 45-54. https://doi.org/10.1145/3450569.346357010.1145/3450569.3463570
- 94. Al-Lail, M. Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control Decisions. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 55-57. https://doi.org/10.1145/3450569.346439510.1145/3450569.3464395
- 95. Xu, S., J. Ning, J. Ma, X. Huang, H. Pang, R. Deng. Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 143-154. https://doi.org/10.1145/3450569.346356110.1145/3450569.3463561
- 96. Gupta, M., R. Sandhu. Towards Activity-Centric Access Control for Smart Collaborative Ecosystems. – In: Proc of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 155-164. https://doi.org/10.1145/3450569.346355910.1145/3450569.3463559
- 97. Ulusoy, O., P. Yolum. Norm-Based Access Control. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 35-46. https://doi.org/10.1145/3381991.339560110.1145/3381991.3395601
- 98. Rosa, M., F. Cerbo, R. Lozoya. Declarative Access Control for Aggregations of Multiple Ownership Data. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 59-70. https://doi.org/10.1145/3381991.339560910.1145/3381991.3395609
- 99. Momen, N., S. Bock, L. Fritcsch. Accept - Maybe - Decline: Introducing Partial Consent for the Permission-Based Access Control Model of Android. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 71-80. https://doi.org/10.1145/3381991.339560310.1145/3381991.3395603
- 100. Heutelbeck, D. Demo: Attribute-Stream-Based Access Control (ASBAC) with the Streaming Attribute Policy Language (SAPL). – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 95-97. https://doi.org/10.1145/3450569.346439710.1145/3450569.3464397
- 101. Crampton, J., E. Eiben, G. Gutin, D. Karapetyan, D. Majumdar. Valued Authorization Policy Existence Problem. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 83-94. https://doi.org/10.1145/3450569.346357110.1145/3450569.3463571
- 102. Gazzarata, G, B. Blobel. Access Control Models – A Systematic Review. – Studies in Health Technology and Informatics, Vol. 261, 2019, pp. 246-252. DOI:10.3233/978-1-61499-975-1-246.
- 103. Zhang, Y., A. Memariani, N. Bidikar. A Review on Blockchain-Based Access Control Models in IoT Applications. – In: 16th IEEE International Conference on Control & Automation (ICCA’20), 2020, pp. 671-676. DOI: 10.1109/ICCA51439.2020.9264499.10.1109/ICCA51439.2020.9264499
- 104. Alnefaie, S., S. Alshehri, A. Cherif. A Survey on Access Control in IoT: Models, Architectures and Research Opportunities. – International Journal of Security and Networks (IJSN), Vol. 16, 2021, No 1, pp. 60-76.10.1504/IJSN.2021.112837
