[
1. Bell, D., L. LaPadula. Secure Computer Systems: Mathematical Foundations and Model. Bedford, MA, The Mitre Corporation, 1973.
]Search in Google Scholar
[
2. Biba, K. Integrity Considerations for Secure Computer Sytems. – In: Technical Report ESD {TR {76-372, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, April 1977.
]Search in Google Scholar
[
3. Schlegal, M. Poster: Shielding AppSPEAR – Enhancing Memory Safety for Trusted Application-level Security Policy Enforcement. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 99-101. https://doi.org/10.1145/3450569.346439610.1145/3450569.3464396
]Search in Google Scholar
[
4. Claeys, T., F. Rousseau, B. Tourancheau. Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment. – In: Proc. of International Workshop on Secure Internet of Things (SIOT), September 2017, Oslo, Norway. Hal-01596135, 2017, pp. 1-9. DOI: 10.1109/SIoT.2017.00006.10.1109/SIoT.2017.00006
]Search in Google Scholar
[
5. Covington, M., W. Long, S. Srinivasan, A. K. Dey, M. Ahamad, G. D. Abowd. Securing Context-Aware Applications Using Environment Roles. – In: Proc. of 6th ACM Symposium on Access Control Models and Technologies ’01, Chantilly, Virginia, USA, May 2001, pp. 10-20. https://doi.org/10.1145/373256.37325810.1145/373256.373258
]Search in Google Scholar
[
6.Corradi, A., R. Montanari, D. Tibaldi. Context-Based Access Control Management in Ubiquitous Environments. – In: Proc. of 3rd IEEE International Symposium on Network Computing and Applications (NCA’04), Cambridge, MA, USA, 30 August-1 September 2004, pp. 253-260. DOI: 10.1109/NCA.2004.1347784.10.1109/NCA.2004.1347784
]Search in Google Scholar
[
7. Corradi, A., R. Montanari, D. Tibaldi. Context-Based Access Control for Ubiquitous Service Provisioning. – In: Proc. of 28th International Computer Software and Applications Conference (COMPSAC’04), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings. IEEE Computer Society, September 2004, pp. 444-451. DOI:10.1109/CMPSAC.2004.1342877.10.1109/CMPSAC.2004.1342877
]Search in Google Scholar
[
8. Trusted Computer System Evaluation Criteria (TCSEC). Department of Defence, USA, 5200.28-STD, 1983.
]Search in Google Scholar
[
9. Ethelbert, O., F. Moghaddam, P. Wieder, R. Yahyapour. A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications. – In: Proc. of 5th International Conference on Future Internet of Things and Cloud (FiCloud’17), IEEE, 2017, pp. 47-53. DOI: 10.1109/FiCloud.2017.29.10.1109/FiCloud.2017.29
]Search in Google Scholar
[
10. Ferraiolo, D., D. Kuhn, R. Chandramouli. Role-Based Access Control. Second Edition. Artech House, 2007.
]Search in Google Scholar
[
11. Ferraiolo, D., R. Sandhu, S. Gavrila, D. Kuhn, R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. – ACM Transactions on Information and System Security, Vol. 4, August 2001, No 3, pp. 224-274.10.1145/501978.501980
]Search in Google Scholar
[
12. Fong, P., I. Siahaan. Relationship-Based Access Control Policies and Their Policy Languages. UC CPSC Technical Report 2011-990-02, January 2011, pp. 51-60. https://doi.org/10.1145/1998441.199845010.1145/1998441.1998450
]Search in Google Scholar
[
13. Fong, P. Relationship-Based Access Control: Protection Model and Policy Language. – In: Proc. of 1st ACM Conference on Data and Application Security and Privacy, CODASPY’11, San Antonio, Texas, USA, 21-23 February 2011, pp. 191-202. https://doi.org/10.1145/1943513.194353910.1145/1943513.1943539
]Search in Google Scholar
[
14. Harrison, M., W. Ruzzo, J. Ullman. Protection in Operating Systems. – CACM, Vol. 19, August 1976, No 8, pp. 461-471.10.1145/360303.360333
]Search in Google Scholar
[
15. Hu, V., D. Ferraiolo, R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, S. Karen. Guide to Attribute-Based Access Control (ABAC) Definitions and Considerations. – In: NIST Special Publication 800-162, SIN’13, 2014.10.6028/NIST.SP.800-162
]Search in Google Scholar
[
16. Iachello, G., G. Abowd. A Token-Based Access Control Mechanism for Automated Capture and Access Systems in Ubiquitous Computing. – In: GVU Technical Report; GIT-GVU-05-06, 2005. Last access April 2021. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.536.197&rep=rep1&type=pdf
]Search in Google Scholar
[
17. Karp, A., H. Haury, M. Davis. From ABAC to ZBAC: The Evolution of Access Control Models. – HP Laboratories, Technical Report HPL-2009-30, 2009. Last access July 2020. http://www.hpl.hp.com/techreports/2009/HPL-2009-30.pdf
]Search in Google Scholar
[
18. Lampson, B. Dynamic Protection Structures. – In: AFIPS Conference Proceedings, Vol. 35, 1969, pp. 27-38.
]Search in Google Scholar
[
19. Liang, Y. Study on View-Based Security Model for Database [J]. – In: Proc. of Sun Yatsen University Forum, 2005, (03), pp. 134-137.
]Search in Google Scholar
[
20. Lin, J., Y. Fang, B. Chen, L. Wan. View-Based Access Control Mechanism for Spatial Database. – In: Proc. of International Conference on Earth Observation Data Processing and Analysis (ICEODPA), Vol. 7285, 728535, Wuhan, China 2008. https://doi.org/10.1117/12.81556910.1117/12.815569
]Search in Google Scholar
[
21. Nguyen, D., J. Park, R. Sandhu. Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. – In: Proc. of 8th International Conference Network and System Security NSS, 2014, pp 15-27.10.1007/978-3-319-11698-3_2
]Search in Google Scholar
[
22. Osborn, S., R. Sandhu, Q. Munawer. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. – ACM Transactions on Information and System Security, Vol. 3, May 2000, No 2, pp. 85-106.10.1145/354876.354878
]Search in Google Scholar
[
23. Park, J., D. Dguyen, R. Sandhu. A Provenance-Based Access Control Model. – In: Proc. of 10th Annual International Conference on Privacy, Security and Trust (PST’12), IEEE, 2012, pp. 137-144.10.1109/PST.2012.6297930
]Search in Google Scholar
[
24. Ramane, M., B. Vasudevan, S. Allaphan. A Provenance-Policy Based Access Control Model for Data Usage Validation in Cloud. – Cryptography and Security, Vol. 3, October 2014, No 5, pp. 1-9. https://arxiv.org/ftp/arxiv/papers/1411/1411.1933.pdf10.5121/ijsptm.2014.3501
]Search in Google Scholar
[
25. Sandhu, R., E. Coyne, H. Feinstein, C. Youman. Role-Based Access Control Models. – In: IEEE Computer, 1996, pp. 38-47.10.1109/2.485845
]Search in Google Scholar
[
26. Sandhu, R., D. Ferraiolo, R. Kuhn. The NIST Model for Role-Based Access Control: Towards a Unified Standard. – In: Proc. of 5th ACM Workshop on Role-Based Access Control, ACM, 2000, pp. 47-63.
]Search in Google Scholar
[
27. Schläger, C., M. Sojer, B. Muschall, G. Pernul. Attribute-Based Authentication and Authorization Infrastructures for e-Commerce Providers. – In: Proc. of EC-Web, 2006, pp 132-141. https://doi.org/10.1007/11823865_1410.1007/11823865_14
]Search in Google Scholar
[
28.Smirnov, A., A. Kashevnik, N. Shilov, N. Teslya. Context-Based Access Control Model for Smart Space. – In: Proc. of 5th International Conference on Cyber Conflict K. Podins, J. Stinissen, M. Maybaum, Eds. NATO CCD COE Publications, Tallinn, 2013, pp. 1-15.
]Search in Google Scholar
[
29. Rosenthal, A., E. Sciore. Content-Based and View-Based Access Control. – In: H. C. A. Van Tilborg, S. Jajodia, Eds. Encyclopedia of Cryptography and Security, Boston, MA, Springer, 2011, pp. 11-59. https://doi.org/10.1007/978-1-4419-5906-5_69510.1007/978-1-4419-5906-5_695
]Search in Google Scholar
[
30.Tzelepi, S., D. Koukopoulos, G. Pangalos. A Flexible Content and Context-Based Access Control Model for Multimedia Medical Image Database Systems. – In: Proc. of 4th Workshop on Multimedia & Security: New Challenges, MM&Sec 2001, Ottawa, Ontario, Canada, 5 October 2001, pp. 52-55. https://doi.org/10.1145/1232454.123247310.1145/1232454.1232473
]Search in Google Scholar
[
31. Ware, W. Security Controls for Computer Systems (U). – In: Report of Defense Science Board Task Force on Computer Security, Santa Monica, CA: The RAND Corporation, February 1970.
]Search in Google Scholar
[
32. Yan, E., J. Tong. Attributed Based Access Control (ABAC) for Web Services. – In: Proc. of IEEE International Conference on Web Services, ICWS 2005, Washington, DC, USA, IEEE Computer Society, 2005, pp. 561-569.10.1109/ICWS.2005.25
]Search in Google Scholar
[
33. Chen, A., G. Lu, H. Xing, Y. Xie, S. Yuan. Dynamic and Semantic-Aware Access-Control Model for Privacy Preservation in Multiple Data Center Environments. – International Journal of Distributed Sensor Networks 2020, Vol. 16, 2020, No 5. https://doi.org/10.1177/155014772092177810.1177/1550147720921778
]Search in Google Scholar
[
34. Fugkeaw, S. A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing. – In: IEEE Access, Vol. 9, 2021, pp. 836-848. DOI: 10.1109/ACCESS.2020.3046869.10.1109/ACCESS.2020.3046869
]Search in Google Scholar
[
35. Guclu, M., C. Bakir, V. Hakkoymaz. A New Scalable and Expandable Access Control Model for Distributed Database Systems in Data Security. – In: Hindawi Scientific Programming. Vol. 2020. 2020, Article ID 8875069. 10 p. https://doi.org/10.1155/2020/887506910.1155/2020/8875069
]Search in Google Scholar
[
36. InterNational Committee for Information Technology Standards (INCITS). Information Technology – Next Generation Access Control. Implementation Requirements, Protocols and API Definitions. USA, 2017.
]Search in Google Scholar
[
37. Information Technology Laboratory National Institute of Standards and Technology, US. Department of Commerce. Exploring the Next Generation of Access Control Methodologies. ITL Bulletin for November 2016.
]Search in Google Scholar
[
38. Diep, N., L. Hung, Y. Zhung, S. Lee, Y. Lee, H. Lee. Enforcing Access Control Using Risk Assessment. – In: Proc. of 4th European Conference on Universal Multiservice Networks, Toulouse, France, 14-16 February 2007, pp. 419-424.10.1109/ECUMN.2007.19
]Search in Google Scholar
[
39. Atlam, H., M. Azad, M. Alassafi, A. Alshdadi, A. Alenezi. Risk-Based Access Control Model: A Systematic Literature Review. – Future Internet, Vol. 12, 2020, No 6, 103. https://doi.org/10.3390/fi1206010310.3390/fi12060103
]Search in Google Scholar
[
40. Atlam, H., A. Alenezi, R. Walters, G. Wills, J. Daniel. Developing an Adaptive Risk-Based Access Control Model for the Internet of Things. – In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 2017, pp. 655-661. DOI: 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.103.10.1109/iThings-GreenCom-CPSCom-SmartData.2017.103
]Search in Google Scholar
[
41. Aluvalu, R., K. Chennam, A. Jabbar, S. Ahamed. Risk Aware Access Control Model for Trust Based Collaborative Organizations in Cloud. – International Journal of Engineering and Technology (UAE), 2018, pp. 49-52. DOI: 10.14419/ijetv7i4.6.20235.
]Search in Google Scholar
[
42. Dimmock, N., J. Bacon, D. Ingram, K. Moody. Risk Models for Trust-Based Access Control (TBAC). – In: P. Herrmann, V. Issarny, S. Shiu, Eds. Trust Management. iTrust 2005. Lecture Notes in Computer Science. Vol. 3477. 2005, Berlin, Heidelberg, Springer, pp. 364-371. https://doi.org/10.1007/11429760_2510.1007/11429760_25
]Search in Google Scholar
[
43. Thomas, R., R. Sandhu. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. – In: T. Y. Lin, S. Qian, Eds. Database Security XI. IFIP Advances in Information and Communication Technology. Boston, MA, Springer, 1998, pp. 166-181. https://doi.org/10.1007/978-0-387-35285-5_1010.1007/978-0-387-35285-5_10
]Search in Google Scholar
[
44. Zhang, C., Y. Hu, G. Zhang. Task-Role Based Dual System Access Control Model. – International Journal of Computer Science and Network Security IJCSNS, Vol. 6, July 2006, No 7B. Last access April 2021. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.100.4090&rep=rep1&type=pdf
]Search in Google Scholar
[
45. Dong, J., H. Zhu, C. Song, Q. Li, R. Xiao. Task-Oriented Multilevel Cooperative Access Control Scheme for Environment with Virtualization and IoT. – In: Hindawi Wireless Communications and Mobile Computing. Vol. 2018. 2018, Article ID 5938152. 11 p. https://doi.org/10.1155/2018/593815210.1155/2018/5938152
]Search in Google Scholar
[
46. Afonin, S. Performance Evaluation of a Rule-Based Access Control Framework. – In: Proc. of 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO’16), Opatija, Croatia, 2016, pp. 1414-1418. DOI: 10.1109/MIPRO.2016.7522361.10.1109/MIPRO.2016.7522361
]Search in Google Scholar
[
47. Kalam, A., R. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel, G. Trouessin. Organization Based Access Control. – In: Proc. of 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’03), Lake Como, Italy, 2003, pp. 120-131. DOI: 10.1109/POLICY.2003.1206966.10.1109/POLICY.2003.1206966
]Search in Google Scholar
[
48. Wang, B., S. Zhang. An Organization and Task Based Access Control Model for Workflow System. – In: K. C. C. Chang et al., Eds. Advances in Web and Network Technologies, and Information Management. APWeb 2007, WAIM 2007. Lecture Notes in Computer Science. Vol. 4537. Berlin, Heidelberg, Springer, 2007, pp. 485-490. https://doi.org/10.1007/978-3-540-72909-9_5110.1007/978-3-540-72909-9_51
]Search in Google Scholar
[
49. Maesa, D., P. Mori, L. Ricci. Blockchain Based Access Control. – In: L. Chen, H. Reiser, Eds. Distributed Applications and Interoperable Systems (DAIS’17). Lecture Notes in Computer Science. Vol. 10320. Springer, Cham., 2017, pp. 206-220. https://doi.org/10.1007/978-3-319-59665-5_1510.1007/978-3-319-59665-5_15
]Search in Google Scholar
[
50. Abdi, I., F. Eassa, K. Jambi, K. Almarhabi. A. AL-Ghamdi. Blockchain Platforms and Access Control Classification for IoT Systems. – In: Symmetry, Vol. 12, 2020, 1663. https://doi.org/10.3390/sym1210166310.3390/sym12101663
]Search in Google Scholar
[
51. Bindra, L., K. Eng, O. Ardakanian, E. Stroulia. Flexible, Decentralized Access Control for Smart Buildings with Smart Contracts. 2021. Last accessed Mart 2021. https://arxiv.org/pdf/2010.08176v1.pdf10.1080/23335777.2021.1922502
]Search in Google Scholar
[
52. Gupta, R., V. Shukla, S. Rao, S. Anwar, P. Sharma, R. Bathla. Enhancing Privacy through “Smart Contract” Using Blockchain-Based Dynamic Access Control. – In: Proc. of International Conference on Computation, Automation and Knowledge Management (ICCAKM’20), Dubai, United Arab Emirates, 2020, pp. 338-343. DOI: 10.1109/ICCAKM46823.2020.9051521.10.1109/ICCAKM46823.2020.9051521
]Search in Google Scholar
[
53. Dramé-Maigné, S., M. Laurent, L. Castillo, H. Ganem. Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain. – In: Proc. of 14th EAI Int. Conf. Secur. Privacy Commun. Netw. (SECURECOMM’18), Seattle, WA, USA, Springer, Jun 2018, pp. 1-16.10.1007/978-3-030-01701-9_4
]Search in Google Scholar
[
54. Thwin, T., S. Vasupongayya. Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems. – In: Hindawi Security and Communication Networks. Vol. 2019. Article ID 8315614. 15 p. https://doi.org/10.1155/2019/831561410.1155/2019/8315614
]Search in Google Scholar
[
55. Dara, A., A. Loneb, A. Babac, R. Naazb, F. Wuc. Blockchain Driven Access Control Mechanisms, Models and Frameworks: A Systematic Literature Review. Last access Mart 2021. https://eprint.iacr.org/2020/1379.pdf, 2021
]Search in Google Scholar
[
56. Carminati, B., E. Ferrari, A. Perego. Rule-Based Access Control for Social Networks. – In: R. Meersman, Z. Tari, P. Herrero, Eds. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science. Vol. 4278. Berlin, Heidelberg, Springer, 2006, pp. 1734-1744. https://doi.org/10.1007/11915072_8010.1007/11915072_80
]Search in Google Scholar
[
57. Martínez, S., J. García, J. Cabot. Runtime Support for Rule-Based Access-Control Evaluation through Model-Transformation. – In: Proc. of 2016 ACM SIGPLAN International Conference on Software Language Engineering (SLE’16), October 2016, pp. 57-69. https://doi.org/10.1145/2997364.299737510.1145/2997364.2997375
]Search in Google Scholar
[
58. Panende, M., Y. Prayudi, I. Riadi. Comparison of Attribute Based Access Control (ABAC) Model and Rule Based Access (RBAC) to Digital Evidence Storage (DES). – International Journal of Cyber-Security and Digital Forensics, 2018, pp. 275-28210.17781/P002451
]Search in Google Scholar
[
59. Li, H., X. Zhang, H. Wu, Y. Qu. Design and Application of Rule Based Access Control Policies. 2005. Last access Mart 2021. https://www.csee.umbc.edu/csee/research/swpw/papers/zhang.pdf
]Search in Google Scholar
[
60. Abadi, M., C. Fournet. Access Control Based on Execution History. – In: Proc. of NDSS Symposium 2003, 2003. Last access Mart 2021. https://www.ndss-symposium.org/wp-content/uploads/2017/09/Access-Control-Based-on-Execution-History-Martin-Abadi.pdf
]Search in Google Scholar
[
61. Röder, P., O. Tafreschi, C. Eckert. History-Based Access Control and Information Flow Control for Structured Documents. – In: Proc. of 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS’07), March 2007, pp. 386-388. https://doi.org/10.1145/1229285.122933610.1145/1229285.1229336
]Search in Google Scholar
[
62. Banerjee, A., D. Naumann. History-Based Access Control and Secure Information Flow. – In: G. Barthe, L. Burdy, M. Huisman, JL. Lanet, T. Muntean, Eds. Construction and Analysis of Safe, Secure, and Interoperable Smart Devices. CASSIS 2004. Lecture Notes in Computer Science. Vol. 3362. Berlin, Heidelberg, Springer, 2005, pp. 27-48. https://doi.org/10.1007/978-3-540-30569-9_210.1007/978-3-540-30569-9_2
]Search in Google Scholar
[
63. Aftab, M., Y. Munir, A. Oluwasanmi, Z. Qin, M. Aziz, Zakria, N. Son, V. Tran. A Hybrid Access Control Model with Dynamic COI for Secure Localization of Satellite and IoT-Based Vehicles. – IEEE Access, Vol. 8, 2020, pp. 24196-24208. DOI: 10.1109/ACCESS.2020.2969715.10.1109/ACCESS.2020.2969715
]Search in Google Scholar
[
64. Xiaoning, M. Formal Description of Trust-Based Access Control. – In: Proc. of 2012 International Conference on Medical Physics and Biomedical Engineering, Physics Procedia, Vol. 33, 2012, pp. 555-560. ISSN 1875-3892. https://doi.org/10.1016/j.phpro.2012.05.10310.1016/j.phpro.2012.05.103
]Search in Google Scholar
[
65. Bhatti, R., E. Bertino, A. Ghafoor. A Trust-Based Context-Aware Access Control Model for Web-Services. – In: Proc. of IEEE International Conference on Web Services, 2004., San Diego, CA, USA, 2004, pp. 184-191. DOI: 10.1109/ICWS.2004.1314738.10.1109/ICWS.2004.1314738
]Search in Google Scholar
[
66. Dimmock, N., A. Belokosztolszki, D. Eyers, J. Bacon, K. Moody. Using Trust and Risk in Role-Based Access Control Policies. – In: Proc. of 9th ACM Symposium on Access Control Models and Technologies (SACMAT’04), June 2004, pp. 156-162. https://doi.org/10.1145/990036.99006210.1145/990036.990062
]Search in Google Scholar
[
67. Jun, S. A Trust-Game-Based Access Control Model for Cloud Service. – In: Hindawi Mobile Information Systems. Vol. 2020. 2020, Article ID 4651205. 14 p. https://doi.org/10.1155/2020/465120510.1155/2020/4651205
]Search in Google Scholar
[
68. Sun, P. Research on Cloud Computing Service Based on Trust Access Control. – International Journal of Engineering Business Management, Vol. 12, 2020, pp. 1-13. Last access April 2021. https://journals.sagepub.com/doi/pdf/10.1177/184797901989744410.1177/1847979019897444
]Search in Google Scholar
[
69. Fu, B., D. O’Sullivan. User Centric Trust-Based Access Control Management for Ubiquitous Computing Environments. – In: NOMS Workshops 2008 – IEEE Network Operations and Management Symposium Workshops, Salvador, Brazil, 2008, pp. 265-274. DOI: 10.1109/NOMSW.2007.43.10.1109/NOMSW.2007.43
]Search in Google Scholar
[
70. Wang, S., Q. Liu. Trust-Based Access Control in Virtual Learning Community. – In: Integration and Innovation Orient to e-Society, Vol. 2. IFIP International Federation for Information Processing. Vol. 252. Springer-Verlag, US, 2007, pp. 514-520. ISBN 978-0-387-75493-2.10.1007/978-0-387-75494-9_62
]Search in Google Scholar
[
71. Danilescu, M. Modeling Access Control and User Actions Using Trust-Based Access Control Policies. – Journal of Social Sciences, Vol. 3, 2020, No 3, pp. 72-84. ISSN 2587-3490. ESSN 2587-3504.
]Search in Google Scholar
[
72. Asmawi, A., L. Affendey, N. Udzir, R. Mahmod. XTRUST: A Severity-Aware Trust-Based Access Control for Enhancing Security Level of XML Database from Insider Threats. – PalArch’s Journal of Archaeology of Egypt/Egyptology, Vol. 18, 2021, No 3, pp. 444-450. https://archives.palarch.nl/index.php/jae/article/view/5604
]Search in Google Scholar
[
73. Shynu, P., K. Singh. A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment. – Cybernetics and Information Technologies, Vol. 16, 2016, No 1, pp. 19-37.10.1515/cait-2016-0002
]Search in Google Scholar
[
74. Tu, S., S. Niu, M. Li. An Efficient Access Control Scheme for Cloud Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, No 3, pp. 77-90.10.2478/cait-2013-0027
]Search in Google Scholar
[
75. Alshehri, S., R. Raj. Secure Access Control for Health Information Sharing Systems. – In: Proc. of 2013 IEEE International Conference on Healthcare Informatics, Philadelphia, PA, 2013, pp. 277-286. DOI: 10.1109/ICHI.2013.40.10.1109/ICHI.2013.40
]Search in Google Scholar
[
76. Gabillon, A., L. Letouzey. A View-Based Access Control Model for SPARQL. – In: 4th International Conference on Network and System Security (NSS’10), September 2010, Melbourne, Australia, pp.105-112. DOI: 10.1109/NSS.2010.35ff. ffhal-01020253f.
]Search in Google Scholar
[
77. Gan, G., E. Chen, Z. Zhou, Y. Zhu. Token-Based Access Control. – IEEE Access, Vol. 8, 2020, pp. 54189-54199. DOI: 10.1109/ACCESS.2020.2979746.10.1109/ACCESS.2020.2979746
]Search in Google Scholar
[
78. Iachello, G., G. Abowd. A Token-Based Access Control Mechanism for Automated Capture and Access Systems in Ubiquitous Computing, 2005. Last access April 2021. https://smartech.gatech.edu/bitstream/handle/1853/4482/05-06.pdf?sequence=1&isAllowed=y
]Search in Google Scholar
[
79. Bethencourt, J., A. Sahai, B. Waters. Ciphertext-Policy Attribute-Based Encryption. – In: 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, CA, USA, 2007, pp. 321-334. DOI: 10.1109/SP.2007.11.10.1109/SP.2007.11
]Search in Google Scholar
[
80. Thomas, R., R. Sandhu. Chapter 10. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. – Database Security XI, 1998, Published by Chapman & Hall, pp. 166-181.10.1007/978-0-387-35285-5_10
]Search in Google Scholar
[
81. Thwin, T., S. Vasupongayya. Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems. – In: Security and Communication Networks, January 2019. https://doi.org/10.1155/2019/831561410.1155/2019/8315614
]Search in Google Scholar
[
82. Sandhu, R., J. Park. Usage Control: A Vision for Next Generation Access Control. – In: MMM-ACNS 2003, Berlin, Heidelberg, Springer-Verlag, LNCS 2776, 2003, pp. 17-31.
]Search in Google Scholar
[
83. Thomas, R., R. Sandhu. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. – In: Proc. of IFIP WG11.3 Workshop on Database Security, Lake Tahoe, California, 11-13 August 1997. DOI: 10.1007/978-0-387-35285-5_10 Source: DBLP. http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=174015A71B4347DEF3193901D5353958?doi=10.1.1.54.6227&rep=rep1&type=pdf, last access April 2021
]Search in Google Scholar
[
84. Heutelbeck, D., M. Baur, M. Kluba. In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 59-70. https://doi.org/10.1145/3450569.346356210.1145/3450569.3463562
]Search in Google Scholar
[
85. Koshutanski, H., F. Martinelli, P. Mori, A. Vaccarelli. H. Fine-Grained and History-Based Access Control with Trust Management for Autonomic Grid Services. – In: Proc. of International Conference on Autonomic and Autonomous Systems (ICAS’06), Silicon Valley, CA, USA, 2006, pp. 34-34. DOI: 10.1109/ICAS.2006.25.10.1109/ICAS.2006.25
]Search in Google Scholar
[
86. Ravari, A., J. Jafarian, M. Amini, R. Jalili. GTHBAC: A Generalized Temporal History Based Access Control Model. – Telecommun Syst, Vol. 45, 2010, pp. 111-125. DOI 10.1007/s11235-009-9239-9.10.1007/s11235-009-9239-9
]Search in Google Scholar
[
87. Edjlali, G., A. Acharya, V. Chaudhary. History-Based Access Control for Mobile Code. – In: J. Vitek, C. D. Jensen, Eds. Secure Internet Programming. Lecture Notes in Computer Science. Vol 1603. Springer, Berlin, Heidelberg, 1999, pp. 413-431. https://doi.org/10.1007/3-540-48749-2_1910.1007/3-540-48749-2_19
]Search in Google Scholar
[
88. Brose, G. A View-Based Access Control Model for CORBA. – In: J. Vitek, C. D. Jensen, Eds. Secure Internet Programming. Lecture Notes in Computer Science. Vol. 1603. Springer, Berlin, Heidelberg, pp. 237-252, https://doi.org/10.1007/3-540-48749-2_1010.1007/3-540-48749-2_10
]Search in Google Scholar
[
89. Masoumzadeh, A., P. Narendran, P. Iyer. Towards a Theory for Semantics and Expressiveness Analysis of Rule-Based Access Control Models. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 33-43. https://doi.org/10.1145/3450569.346356910.1145/3450569.3463569
]Search in Google Scholar
[
90. Chen, E., V. Dubrovenski, D. Xu. Mutation Analysis of NGAC Policies. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 71-82. https://doi.org/10.1145/3450569.346356310.1145/3450569.3463563
]Search in Google Scholar
[
91. Jacob, F., L. Becker, J. Grashöfer, H. Hartenstein. Matrix Decomposition: Analysis of an Access Control Approach on Transaction-Based DAGs without Finality. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 81-92. https://doi.org/10.1145/3381991.339539910.1145/3381991.3395399
]Search in Google Scholar
[
92. Enck, W. Analysis of Access Control Enforcement in Android. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 117-118. https://doi.org/10.1145/3381991.339539610.1145/3381991.3395396
]Search in Google Scholar
[
93. Radhika, B., N. Narendra Kumar, R. Shyamasundar. Towards Unifying RBAC with Information Flow Control. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 45-54. https://doi.org/10.1145/3450569.346357010.1145/3450569.3463570
]Search in Google Scholar
[
94. Al-Lail, M. Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control Decisions. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 55-57. https://doi.org/10.1145/3450569.346439510.1145/3450569.3464395
]Search in Google Scholar
[
95. Xu, S., J. Ning, J. Ma, X. Huang, H. Pang, R. Deng. Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 143-154. https://doi.org/10.1145/3450569.346356110.1145/3450569.3463561
]Search in Google Scholar
[
96. Gupta, M., R. Sandhu. Towards Activity-Centric Access Control for Smart Collaborative Ecosystems. – In: Proc of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 155-164. https://doi.org/10.1145/3450569.346355910.1145/3450569.3463559
]Search in Google Scholar
[
97. Ulusoy, O., P. Yolum. Norm-Based Access Control. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 35-46. https://doi.org/10.1145/3381991.339560110.1145/3381991.3395601
]Search in Google Scholar
[
98. Rosa, M., F. Cerbo, R. Lozoya. Declarative Access Control for Aggregations of Multiple Ownership Data. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 59-70. https://doi.org/10.1145/3381991.339560910.1145/3381991.3395609
]Search in Google Scholar
[
99. Momen, N., S. Bock, L. Fritcsch. Accept - Maybe - Decline: Introducing Partial Consent for the Permission-Based Access Control Model of Android. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 71-80. https://doi.org/10.1145/3381991.339560310.1145/3381991.3395603
]Search in Google Scholar
[
100. Heutelbeck, D. Demo: Attribute-Stream-Based Access Control (ASBAC) with the Streaming Attribute Policy Language (SAPL). – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 95-97. https://doi.org/10.1145/3450569.346439710.1145/3450569.3464397
]Search in Google Scholar
[
101. Crampton, J., E. Eiben, G. Gutin, D. Karapetyan, D. Majumdar. Valued Authorization Policy Existence Problem. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 83-94. https://doi.org/10.1145/3450569.346357110.1145/3450569.3463571
]Search in Google Scholar
[
102. Gazzarata, G, B. Blobel. Access Control Models – A Systematic Review. – Studies in Health Technology and Informatics, Vol. 261, 2019, pp. 246-252. DOI:10.3233/978-1-61499-975-1-246.
]Search in Google Scholar
[
103. Zhang, Y., A. Memariani, N. Bidikar. A Review on Blockchain-Based Access Control Models in IoT Applications. – In: 16th IEEE International Conference on Control & Automation (ICCA’20), 2020, pp. 671-676. DOI: 10.1109/ICCA51439.2020.9264499.10.1109/ICCA51439.2020.9264499
]Search in Google Scholar
[
104. Alnefaie, S., S. Alshehri, A. Cherif. A Survey on Access Control in IoT: Models, Architectures and Research Opportunities. – International Journal of Security and Networks (IJSN), Vol. 16, 2021, No 1, pp. 60-76.10.1504/IJSN.2021.112837
]Search in Google Scholar