À propos de cet article

Citez

1. Bell, D., L. LaPadula. Secure Computer Systems: Mathematical Foundations and Model. Bedford, MA, The Mitre Corporation, 1973. Search in Google Scholar

2. Biba, K. Integrity Considerations for Secure Computer Sytems. – In: Technical Report ESD {TR {76-372, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, April 1977. Search in Google Scholar

3. Schlegal, M. Poster: Shielding AppSPEAR – Enhancing Memory Safety for Trusted Application-level Security Policy Enforcement. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 99-101. https://doi.org/10.1145/3450569.346439610.1145/3450569.3464396 Search in Google Scholar

4. Claeys, T., F. Rousseau, B. Tourancheau. Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment. – In: Proc. of International Workshop on Secure Internet of Things (SIOT), September 2017, Oslo, Norway. Hal-01596135, 2017, pp. 1-9. DOI: 10.1109/SIoT.2017.00006.10.1109/SIoT.2017.00006 Search in Google Scholar

5. Covington, M., W. Long, S. Srinivasan, A. K. Dey, M. Ahamad, G. D. Abowd. Securing Context-Aware Applications Using Environment Roles. – In: Proc. of 6th ACM Symposium on Access Control Models and Technologies ’01, Chantilly, Virginia, USA, May 2001, pp. 10-20. https://doi.org/10.1145/373256.37325810.1145/373256.373258 Search in Google Scholar

6.Corradi, A., R. Montanari, D. Tibaldi. Context-Based Access Control Management in Ubiquitous Environments. – In: Proc. of 3rd IEEE International Symposium on Network Computing and Applications (NCA’04), Cambridge, MA, USA, 30 August-1 September 2004, pp. 253-260. DOI: 10.1109/NCA.2004.1347784.10.1109/NCA.2004.1347784 Search in Google Scholar

7. Corradi, A., R. Montanari, D. Tibaldi. Context-Based Access Control for Ubiquitous Service Provisioning. – In: Proc. of 28th International Computer Software and Applications Conference (COMPSAC’04), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings. IEEE Computer Society, September 2004, pp. 444-451. DOI:10.1109/CMPSAC.2004.1342877.10.1109/CMPSAC.2004.1342877 Search in Google Scholar

8. Trusted Computer System Evaluation Criteria (TCSEC). Department of Defence, USA, 5200.28-STD, 1983. Search in Google Scholar

9. Ethelbert, O., F. Moghaddam, P. Wieder, R. Yahyapour. A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications. – In: Proc. of 5th International Conference on Future Internet of Things and Cloud (FiCloud’17), IEEE, 2017, pp. 47-53. DOI: 10.1109/FiCloud.2017.29.10.1109/FiCloud.2017.29 Search in Google Scholar

10. Ferraiolo, D., D. Kuhn, R. Chandramouli. Role-Based Access Control. Second Edition. Artech House, 2007. Search in Google Scholar

11. Ferraiolo, D., R. Sandhu, S. Gavrila, D. Kuhn, R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. – ACM Transactions on Information and System Security, Vol. 4, August 2001, No 3, pp. 224-274.10.1145/501978.501980 Search in Google Scholar

12. Fong, P., I. Siahaan. Relationship-Based Access Control Policies and Their Policy Languages. UC CPSC Technical Report 2011-990-02, January 2011, pp. 51-60. https://doi.org/10.1145/1998441.199845010.1145/1998441.1998450 Search in Google Scholar

13. Fong, P. Relationship-Based Access Control: Protection Model and Policy Language. – In: Proc. of 1st ACM Conference on Data and Application Security and Privacy, CODASPY’11, San Antonio, Texas, USA, 21-23 February 2011, pp. 191-202. https://doi.org/10.1145/1943513.194353910.1145/1943513.1943539 Search in Google Scholar

14. Harrison, M., W. Ruzzo, J. Ullman. Protection in Operating Systems. – CACM, Vol. 19, August 1976, No 8, pp. 461-471.10.1145/360303.360333 Search in Google Scholar

15. Hu, V., D. Ferraiolo, R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, S. Karen. Guide to Attribute-Based Access Control (ABAC) Definitions and Considerations. – In: NIST Special Publication 800-162, SIN’13, 2014.10.6028/NIST.SP.800-162 Search in Google Scholar

16. Iachello, G., G. Abowd. A Token-Based Access Control Mechanism for Automated Capture and Access Systems in Ubiquitous Computing. – In: GVU Technical Report; GIT-GVU-05-06, 2005. Last access April 2021. https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.536.197&rep=rep1&type=pdf Search in Google Scholar

17. Karp, A., H. Haury, M. Davis. From ABAC to ZBAC: The Evolution of Access Control Models. – HP Laboratories, Technical Report HPL-2009-30, 2009. Last access July 2020. http://www.hpl.hp.com/techreports/2009/HPL-2009-30.pdf Search in Google Scholar

18. Lampson, B. Dynamic Protection Structures. – In: AFIPS Conference Proceedings, Vol. 35, 1969, pp. 27-38. Search in Google Scholar

19. Liang, Y. Study on View-Based Security Model for Database [J]. – In: Proc. of Sun Yatsen University Forum, 2005, (03), pp. 134-137. Search in Google Scholar

20. Lin, J., Y. Fang, B. Chen, L. Wan. View-Based Access Control Mechanism for Spatial Database. – In: Proc. of International Conference on Earth Observation Data Processing and Analysis (ICEODPA), Vol. 7285, 728535, Wuhan, China 2008. https://doi.org/10.1117/12.81556910.1117/12.815569 Search in Google Scholar

21. Nguyen, D., J. Park, R. Sandhu. Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. – In: Proc. of 8th International Conference Network and System Security NSS, 2014, pp 15-27.10.1007/978-3-319-11698-3_2 Search in Google Scholar

22. Osborn, S., R. Sandhu, Q. Munawer. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. – ACM Transactions on Information and System Security, Vol. 3, May 2000, No 2, pp. 85-106.10.1145/354876.354878 Search in Google Scholar

23. Park, J., D. Dguyen, R. Sandhu. A Provenance-Based Access Control Model. – In: Proc. of 10th Annual International Conference on Privacy, Security and Trust (PST’12), IEEE, 2012, pp. 137-144.10.1109/PST.2012.6297930 Search in Google Scholar

24. Ramane, M., B. Vasudevan, S. Allaphan. A Provenance-Policy Based Access Control Model for Data Usage Validation in Cloud. – Cryptography and Security, Vol. 3, October 2014, No 5, pp. 1-9. https://arxiv.org/ftp/arxiv/papers/1411/1411.1933.pdf10.5121/ijsptm.2014.3501 Search in Google Scholar

25. Sandhu, R., E. Coyne, H. Feinstein, C. Youman. Role-Based Access Control Models. – In: IEEE Computer, 1996, pp. 38-47.10.1109/2.485845 Search in Google Scholar

26. Sandhu, R., D. Ferraiolo, R. Kuhn. The NIST Model for Role-Based Access Control: Towards a Unified Standard. – In: Proc. of 5th ACM Workshop on Role-Based Access Control, ACM, 2000, pp. 47-63. Search in Google Scholar

27. Schläger, C., M. Sojer, B. Muschall, G. Pernul. Attribute-Based Authentication and Authorization Infrastructures for e-Commerce Providers. – In: Proc. of EC-Web, 2006, pp 132-141. https://doi.org/10.1007/11823865_1410.1007/11823865_14 Search in Google Scholar

28.Smirnov, A., A. Kashevnik, N. Shilov, N. Teslya. Context-Based Access Control Model for Smart Space. – In: Proc. of 5th International Conference on Cyber Conflict K. Podins, J. Stinissen, M. Maybaum, Eds. NATO CCD COE Publications, Tallinn, 2013, pp. 1-15. Search in Google Scholar

29. Rosenthal, A., E. Sciore. Content-Based and View-Based Access Control. – In: H. C. A. Van Tilborg, S. Jajodia, Eds. Encyclopedia of Cryptography and Security, Boston, MA, Springer, 2011, pp. 11-59. https://doi.org/10.1007/978-1-4419-5906-5_69510.1007/978-1-4419-5906-5_695 Search in Google Scholar

30.Tzelepi, S., D. Koukopoulos, G. Pangalos. A Flexible Content and Context-Based Access Control Model for Multimedia Medical Image Database Systems. – In: Proc. of 4th Workshop on Multimedia & Security: New Challenges, MM&Sec 2001, Ottawa, Ontario, Canada, 5 October 2001, pp. 52-55. https://doi.org/10.1145/1232454.123247310.1145/1232454.1232473 Search in Google Scholar

31. Ware, W. Security Controls for Computer Systems (U). – In: Report of Defense Science Board Task Force on Computer Security, Santa Monica, CA: The RAND Corporation, February 1970. Search in Google Scholar

32. Yan, E., J. Tong. Attributed Based Access Control (ABAC) for Web Services. – In: Proc. of IEEE International Conference on Web Services, ICWS 2005, Washington, DC, USA, IEEE Computer Society, 2005, pp. 561-569.10.1109/ICWS.2005.25 Search in Google Scholar

33. Chen, A., G. Lu, H. Xing, Y. Xie, S. Yuan. Dynamic and Semantic-Aware Access-Control Model for Privacy Preservation in Multiple Data Center Environments. – International Journal of Distributed Sensor Networks 2020, Vol. 16, 2020, No 5. https://doi.org/10.1177/155014772092177810.1177/1550147720921778 Search in Google Scholar

34. Fugkeaw, S. A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing. – In: IEEE Access, Vol. 9, 2021, pp. 836-848. DOI: 10.1109/ACCESS.2020.3046869.10.1109/ACCESS.2020.3046869 Search in Google Scholar

35. Guclu, M., C. Bakir, V. Hakkoymaz. A New Scalable and Expandable Access Control Model for Distributed Database Systems in Data Security. – In: Hindawi Scientific Programming. Vol. 2020. 2020, Article ID 8875069. 10 p. https://doi.org/10.1155/2020/887506910.1155/2020/8875069 Search in Google Scholar

36. InterNational Committee for Information Technology Standards (INCITS). Information Technology – Next Generation Access Control. Implementation Requirements, Protocols and API Definitions. USA, 2017. Search in Google Scholar

37. Information Technology Laboratory National Institute of Standards and Technology, US. Department of Commerce. Exploring the Next Generation of Access Control Methodologies. ITL Bulletin for November 2016. Search in Google Scholar

38. Diep, N., L. Hung, Y. Zhung, S. Lee, Y. Lee, H. Lee. Enforcing Access Control Using Risk Assessment. – In: Proc. of 4th European Conference on Universal Multiservice Networks, Toulouse, France, 14-16 February 2007, pp. 419-424.10.1109/ECUMN.2007.19 Search in Google Scholar

39. Atlam, H., M. Azad, M. Alassafi, A. Alshdadi, A. Alenezi. Risk-Based Access Control Model: A Systematic Literature Review. – Future Internet, Vol. 12, 2020, No 6, 103. https://doi.org/10.3390/fi1206010310.3390/fi12060103 Search in Google Scholar

40. Atlam, H., A. Alenezi, R. Walters, G. Wills, J. Daniel. Developing an Adaptive Risk-Based Access Control Model for the Internet of Things. – In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 2017, pp. 655-661. DOI: 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.103.10.1109/iThings-GreenCom-CPSCom-SmartData.2017.103 Search in Google Scholar

41. Aluvalu, R., K. Chennam, A. Jabbar, S. Ahamed. Risk Aware Access Control Model for Trust Based Collaborative Organizations in Cloud. – International Journal of Engineering and Technology (UAE), 2018, pp. 49-52. DOI: 10.14419/ijetv7i4.6.20235. Search in Google Scholar

42. Dimmock, N., J. Bacon, D. Ingram, K. Moody. Risk Models for Trust-Based Access Control (TBAC). – In: P. Herrmann, V. Issarny, S. Shiu, Eds. Trust Management. iTrust 2005. Lecture Notes in Computer Science. Vol. 3477. 2005, Berlin, Heidelberg, Springer, pp. 364-371. https://doi.org/10.1007/11429760_2510.1007/11429760_25 Search in Google Scholar

43. Thomas, R., R. Sandhu. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. – In: T. Y. Lin, S. Qian, Eds. Database Security XI. IFIP Advances in Information and Communication Technology. Boston, MA, Springer, 1998, pp. 166-181. https://doi.org/10.1007/978-0-387-35285-5_1010.1007/978-0-387-35285-5_10 Search in Google Scholar

44. Zhang, C., Y. Hu, G. Zhang. Task-Role Based Dual System Access Control Model. – International Journal of Computer Science and Network Security IJCSNS, Vol. 6, July 2006, No 7B. Last access April 2021. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.100.4090&rep=rep1&type=pdf Search in Google Scholar

45. Dong, J., H. Zhu, C. Song, Q. Li, R. Xiao. Task-Oriented Multilevel Cooperative Access Control Scheme for Environment with Virtualization and IoT. – In: Hindawi Wireless Communications and Mobile Computing. Vol. 2018. 2018, Article ID 5938152. 11 p. https://doi.org/10.1155/2018/593815210.1155/2018/5938152 Search in Google Scholar

46. Afonin, S. Performance Evaluation of a Rule-Based Access Control Framework. – In: Proc. of 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO’16), Opatija, Croatia, 2016, pp. 1414-1418. DOI: 10.1109/MIPRO.2016.7522361.10.1109/MIPRO.2016.7522361 Search in Google Scholar

47. Kalam, A., R. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel, G. Trouessin. Organization Based Access Control. – In: Proc. of 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’03), Lake Como, Italy, 2003, pp. 120-131. DOI: 10.1109/POLICY.2003.1206966.10.1109/POLICY.2003.1206966 Search in Google Scholar

48. Wang, B., S. Zhang. An Organization and Task Based Access Control Model for Workflow System. – In: K. C. C. Chang et al., Eds. Advances in Web and Network Technologies, and Information Management. APWeb 2007, WAIM 2007. Lecture Notes in Computer Science. Vol. 4537. Berlin, Heidelberg, Springer, 2007, pp. 485-490. https://doi.org/10.1007/978-3-540-72909-9_5110.1007/978-3-540-72909-9_51 Search in Google Scholar

49. Maesa, D., P. Mori, L. Ricci. Blockchain Based Access Control. – In: L. Chen, H. Reiser, Eds. Distributed Applications and Interoperable Systems (DAIS’17). Lecture Notes in Computer Science. Vol. 10320. Springer, Cham., 2017, pp. 206-220. https://doi.org/10.1007/978-3-319-59665-5_1510.1007/978-3-319-59665-5_15 Search in Google Scholar

50. Abdi, I., F. Eassa, K. Jambi, K. Almarhabi. A. AL-Ghamdi. Blockchain Platforms and Access Control Classification for IoT Systems. – In: Symmetry, Vol. 12, 2020, 1663. https://doi.org/10.3390/sym1210166310.3390/sym12101663 Search in Google Scholar

51. Bindra, L., K. Eng, O. Ardakanian, E. Stroulia. Flexible, Decentralized Access Control for Smart Buildings with Smart Contracts. 2021. Last accessed Mart 2021. https://arxiv.org/pdf/2010.08176v1.pdf10.1080/23335777.2021.1922502 Search in Google Scholar

52. Gupta, R., V. Shukla, S. Rao, S. Anwar, P. Sharma, R. Bathla. Enhancing Privacy through “Smart Contract” Using Blockchain-Based Dynamic Access Control. – In: Proc. of International Conference on Computation, Automation and Knowledge Management (ICCAKM’20), Dubai, United Arab Emirates, 2020, pp. 338-343. DOI: 10.1109/ICCAKM46823.2020.9051521.10.1109/ICCAKM46823.2020.9051521 Search in Google Scholar

53. Dramé-Maigné, S., M. Laurent, L. Castillo, H. Ganem. Augmented Chain of Ownership: Configuring IoT Devices with the Help of the Blockchain. – In: Proc. of 14th EAI Int. Conf. Secur. Privacy Commun. Netw. (SECURECOMM’18), Seattle, WA, USA, Springer, Jun 2018, pp. 1-16.10.1007/978-3-030-01701-9_4 Search in Google Scholar

54. Thwin, T., S. Vasupongayya. Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems. – In: Hindawi Security and Communication Networks. Vol. 2019. Article ID 8315614. 15 p. https://doi.org/10.1155/2019/831561410.1155/2019/8315614 Search in Google Scholar

55. Dara, A., A. Loneb, A. Babac, R. Naazb, F. Wuc. Blockchain Driven Access Control Mechanisms, Models and Frameworks: A Systematic Literature Review. Last access Mart 2021. https://eprint.iacr.org/2020/1379.pdf, 2021 Search in Google Scholar

56. Carminati, B., E. Ferrari, A. Perego. Rule-Based Access Control for Social Networks. – In: R. Meersman, Z. Tari, P. Herrero, Eds. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science. Vol. 4278. Berlin, Heidelberg, Springer, 2006, pp. 1734-1744. https://doi.org/10.1007/11915072_8010.1007/11915072_80 Search in Google Scholar

57. Martínez, S., J. García, J. Cabot. Runtime Support for Rule-Based Access-Control Evaluation through Model-Transformation. – In: Proc. of 2016 ACM SIGPLAN International Conference on Software Language Engineering (SLE’16), October 2016, pp. 57-69. https://doi.org/10.1145/2997364.299737510.1145/2997364.2997375 Search in Google Scholar

58. Panende, M., Y. Prayudi, I. Riadi. Comparison of Attribute Based Access Control (ABAC) Model and Rule Based Access (RBAC) to Digital Evidence Storage (DES). – International Journal of Cyber-Security and Digital Forensics, 2018, pp. 275-28210.17781/P002451 Search in Google Scholar

59. Li, H., X. Zhang, H. Wu, Y. Qu. Design and Application of Rule Based Access Control Policies. 2005. Last access Mart 2021. https://www.csee.umbc.edu/csee/research/swpw/papers/zhang.pdf Search in Google Scholar

60. Abadi, M., C. Fournet. Access Control Based on Execution History. – In: Proc. of NDSS Symposium 2003, 2003. Last access Mart 2021. https://www.ndss-symposium.org/wp-content/uploads/2017/09/Access-Control-Based-on-Execution-History-Martin-Abadi.pdf Search in Google Scholar

61. Röder, P., O. Tafreschi, C. Eckert. History-Based Access Control and Information Flow Control for Structured Documents. – In: Proc. of 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS’07), March 2007, pp. 386-388. https://doi.org/10.1145/1229285.122933610.1145/1229285.1229336 Search in Google Scholar

62. Banerjee, A., D. Naumann. History-Based Access Control and Secure Information Flow. – In: G. Barthe, L. Burdy, M. Huisman, JL. Lanet, T. Muntean, Eds. Construction and Analysis of Safe, Secure, and Interoperable Smart Devices. CASSIS 2004. Lecture Notes in Computer Science. Vol. 3362. Berlin, Heidelberg, Springer, 2005, pp. 27-48. https://doi.org/10.1007/978-3-540-30569-9_210.1007/978-3-540-30569-9_2 Search in Google Scholar

63. Aftab, M., Y. Munir, A. Oluwasanmi, Z. Qin, M. Aziz, Zakria, N. Son, V. Tran. A Hybrid Access Control Model with Dynamic COI for Secure Localization of Satellite and IoT-Based Vehicles. – IEEE Access, Vol. 8, 2020, pp. 24196-24208. DOI: 10.1109/ACCESS.2020.2969715.10.1109/ACCESS.2020.2969715 Search in Google Scholar

64. Xiaoning, M. Formal Description of Trust-Based Access Control. – In: Proc. of 2012 International Conference on Medical Physics and Biomedical Engineering, Physics Procedia, Vol. 33, 2012, pp. 555-560. ISSN 1875-3892. https://doi.org/10.1016/j.phpro.2012.05.10310.1016/j.phpro.2012.05.103 Search in Google Scholar

65. Bhatti, R., E. Bertino, A. Ghafoor. A Trust-Based Context-Aware Access Control Model for Web-Services. – In: Proc. of IEEE International Conference on Web Services, 2004., San Diego, CA, USA, 2004, pp. 184-191. DOI: 10.1109/ICWS.2004.1314738.10.1109/ICWS.2004.1314738 Search in Google Scholar

66. Dimmock, N., A. Belokosztolszki, D. Eyers, J. Bacon, K. Moody. Using Trust and Risk in Role-Based Access Control Policies. – In: Proc. of 9th ACM Symposium on Access Control Models and Technologies (SACMAT’04), June 2004, pp. 156-162. https://doi.org/10.1145/990036.99006210.1145/990036.990062 Search in Google Scholar

67. Jun, S. A Trust-Game-Based Access Control Model for Cloud Service. – In: Hindawi Mobile Information Systems. Vol. 2020. 2020, Article ID 4651205. 14 p. https://doi.org/10.1155/2020/465120510.1155/2020/4651205 Search in Google Scholar

68. Sun, P. Research on Cloud Computing Service Based on Trust Access Control. – International Journal of Engineering Business Management, Vol. 12, 2020, pp. 1-13. Last access April 2021. https://journals.sagepub.com/doi/pdf/10.1177/184797901989744410.1177/1847979019897444 Search in Google Scholar

69. Fu, B., D. O’Sullivan. User Centric Trust-Based Access Control Management for Ubiquitous Computing Environments. – In: NOMS Workshops 2008 – IEEE Network Operations and Management Symposium Workshops, Salvador, Brazil, 2008, pp. 265-274. DOI: 10.1109/NOMSW.2007.43.10.1109/NOMSW.2007.43 Search in Google Scholar

70. Wang, S., Q. Liu. Trust-Based Access Control in Virtual Learning Community. – In: Integration and Innovation Orient to e-Society, Vol. 2. IFIP International Federation for Information Processing. Vol. 252. Springer-Verlag, US, 2007, pp. 514-520. ISBN 978-0-387-75493-2.10.1007/978-0-387-75494-9_62 Search in Google Scholar

71. Danilescu, M. Modeling Access Control and User Actions Using Trust-Based Access Control Policies. – Journal of Social Sciences, Vol. 3, 2020, No 3, pp. 72-84. ISSN 2587-3490. ESSN 2587-3504. Search in Google Scholar

72. Asmawi, A., L. Affendey, N. Udzir, R. Mahmod. XTRUST: A Severity-Aware Trust-Based Access Control for Enhancing Security Level of XML Database from Insider Threats. – PalArch’s Journal of Archaeology of Egypt/Egyptology, Vol. 18, 2021, No 3, pp. 444-450. https://archives.palarch.nl/index.php/jae/article/view/5604 Search in Google Scholar

73. Shynu, P., K. Singh. A Comprehensive Survey and Analysis on Access Control Schemes in Cloud Environment. – Cybernetics and Information Technologies, Vol. 16, 2016, No 1, pp. 19-37.10.1515/cait-2016-0002 Search in Google Scholar

74. Tu, S., S. Niu, M. Li. An Efficient Access Control Scheme for Cloud Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, No 3, pp. 77-90.10.2478/cait-2013-0027 Search in Google Scholar

75. Alshehri, S., R. Raj. Secure Access Control for Health Information Sharing Systems. – In: Proc. of 2013 IEEE International Conference on Healthcare Informatics, Philadelphia, PA, 2013, pp. 277-286. DOI: 10.1109/ICHI.2013.40.10.1109/ICHI.2013.40 Search in Google Scholar

76. Gabillon, A., L. Letouzey. A View-Based Access Control Model for SPARQL. – In: 4th International Conference on Network and System Security (NSS’10), September 2010, Melbourne, Australia, pp.105-112. DOI: 10.1109/NSS.2010.35ff. ffhal-01020253f. Search in Google Scholar

77. Gan, G., E. Chen, Z. Zhou, Y. Zhu. Token-Based Access Control. – IEEE Access, Vol. 8, 2020, pp. 54189-54199. DOI: 10.1109/ACCESS.2020.2979746.10.1109/ACCESS.2020.2979746 Search in Google Scholar

78. Iachello, G., G. Abowd. A Token-Based Access Control Mechanism for Automated Capture and Access Systems in Ubiquitous Computing, 2005. Last access April 2021. https://smartech.gatech.edu/bitstream/handle/1853/4482/05-06.pdf?sequence=1&isAllowed=y Search in Google Scholar

79. Bethencourt, J., A. Sahai, B. Waters. Ciphertext-Policy Attribute-Based Encryption. – In: 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, CA, USA, 2007, pp. 321-334. DOI: 10.1109/SP.2007.11.10.1109/SP.2007.11 Search in Google Scholar

80. Thomas, R., R. Sandhu. Chapter 10. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. – Database Security XI, 1998, Published by Chapman & Hall, pp. 166-181.10.1007/978-0-387-35285-5_10 Search in Google Scholar

81. Thwin, T., S. Vasupongayya. Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems. – In: Security and Communication Networks, January 2019. https://doi.org/10.1155/2019/831561410.1155/2019/8315614 Search in Google Scholar

82. Sandhu, R., J. Park. Usage Control: A Vision for Next Generation Access Control. – In: MMM-ACNS 2003, Berlin, Heidelberg, Springer-Verlag, LNCS 2776, 2003, pp. 17-31. Search in Google Scholar

83. Thomas, R., R. Sandhu. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. – In: Proc. of IFIP WG11.3 Workshop on Database Security, Lake Tahoe, California, 11-13 August 1997. DOI: 10.1007/978-0-387-35285-5_10 Source: DBLP. http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=174015A71B4347DEF3193901D5353958?doi=10.1.1.54.6227&rep=rep1&type=pdf, last access April 2021 Search in Google Scholar

84. Heutelbeck, D., M. Baur, M. Kluba. In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 59-70. https://doi.org/10.1145/3450569.346356210.1145/3450569.3463562 Search in Google Scholar

85. Koshutanski, H., F. Martinelli, P. Mori, A. Vaccarelli. H. Fine-Grained and History-Based Access Control with Trust Management for Autonomic Grid Services. – In: Proc. of International Conference on Autonomic and Autonomous Systems (ICAS’06), Silicon Valley, CA, USA, 2006, pp. 34-34. DOI: 10.1109/ICAS.2006.25.10.1109/ICAS.2006.25 Search in Google Scholar

86. Ravari, A., J. Jafarian, M. Amini, R. Jalili. GTHBAC: A Generalized Temporal History Based Access Control Model. – Telecommun Syst, Vol. 45, 2010, pp. 111-125. DOI 10.1007/s11235-009-9239-9.10.1007/s11235-009-9239-9 Search in Google Scholar

87. Edjlali, G., A. Acharya, V. Chaudhary. History-Based Access Control for Mobile Code. – In: J. Vitek, C. D. Jensen, Eds. Secure Internet Programming. Lecture Notes in Computer Science. Vol 1603. Springer, Berlin, Heidelberg, 1999, pp. 413-431. https://doi.org/10.1007/3-540-48749-2_1910.1007/3-540-48749-2_19 Search in Google Scholar

88. Brose, G. A View-Based Access Control Model for CORBA. – In: J. Vitek, C. D. Jensen, Eds. Secure Internet Programming. Lecture Notes in Computer Science. Vol. 1603. Springer, Berlin, Heidelberg, pp. 237-252, https://doi.org/10.1007/3-540-48749-2_1010.1007/3-540-48749-2_10 Search in Google Scholar

89. Masoumzadeh, A., P. Narendran, P. Iyer. Towards a Theory for Semantics and Expressiveness Analysis of Rule-Based Access Control Models. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 33-43. https://doi.org/10.1145/3450569.346356910.1145/3450569.3463569 Search in Google Scholar

90. Chen, E., V. Dubrovenski, D. Xu. Mutation Analysis of NGAC Policies. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 71-82. https://doi.org/10.1145/3450569.346356310.1145/3450569.3463563 Search in Google Scholar

91. Jacob, F., L. Becker, J. Grashöfer, H. Hartenstein. Matrix Decomposition: Analysis of an Access Control Approach on Transaction-Based DAGs without Finality. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 81-92. https://doi.org/10.1145/3381991.339539910.1145/3381991.3395399 Search in Google Scholar

92. Enck, W. Analysis of Access Control Enforcement in Android. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 117-118. https://doi.org/10.1145/3381991.339539610.1145/3381991.3395396 Search in Google Scholar

93. Radhika, B., N. Narendra Kumar, R. Shyamasundar. Towards Unifying RBAC with Information Flow Control. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 45-54. https://doi.org/10.1145/3450569.346357010.1145/3450569.3463570 Search in Google Scholar

94. Al-Lail, M. Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control Decisions. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 55-57. https://doi.org/10.1145/3450569.346439510.1145/3450569.3464395 Search in Google Scholar

95. Xu, S., J. Ning, J. Ma, X. Huang, H. Pang, R. Deng. Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 143-154. https://doi.org/10.1145/3450569.346356110.1145/3450569.3463561 Search in Google Scholar

96. Gupta, M., R. Sandhu. Towards Activity-Centric Access Control for Smart Collaborative Ecosystems. – In: Proc of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 155-164. https://doi.org/10.1145/3450569.346355910.1145/3450569.3463559 Search in Google Scholar

97. Ulusoy, O., P. Yolum. Norm-Based Access Control. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 35-46. https://doi.org/10.1145/3381991.339560110.1145/3381991.3395601 Search in Google Scholar

98. Rosa, M., F. Cerbo, R. Lozoya. Declarative Access Control for Aggregations of Multiple Ownership Data. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 59-70. https://doi.org/10.1145/3381991.339560910.1145/3381991.3395609 Search in Google Scholar

99. Momen, N., S. Bock, L. Fritcsch. Accept - Maybe - Decline: Introducing Partial Consent for the Permission-Based Access Control Model of Android. – In: Proc. of 25th ACM Symposium on Access Control Models and Technologies (SACMAT’20), June 2020, pp. 71-80. https://doi.org/10.1145/3381991.339560310.1145/3381991.3395603 Search in Google Scholar

100. Heutelbeck, D. Demo: Attribute-Stream-Based Access Control (ASBAC) with the Streaming Attribute Policy Language (SAPL). – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 95-97. https://doi.org/10.1145/3450569.346439710.1145/3450569.3464397 Search in Google Scholar

101. Crampton, J., E. Eiben, G. Gutin, D. Karapetyan, D. Majumdar. Valued Authorization Policy Existence Problem. – In: Proc. of 26th ACM Symposium on Access Control Models and Technologies (SACMAT’21), June 2021, pp. 83-94. https://doi.org/10.1145/3450569.346357110.1145/3450569.3463571 Search in Google Scholar

102. Gazzarata, G, B. Blobel. Access Control Models – A Systematic Review. – Studies in Health Technology and Informatics, Vol. 261, 2019, pp. 246-252. DOI:10.3233/978-1-61499-975-1-246. Search in Google Scholar

103. Zhang, Y., A. Memariani, N. Bidikar. A Review on Blockchain-Based Access Control Models in IoT Applications. – In: 16th IEEE International Conference on Control & Automation (ICCA’20), 2020, pp. 671-676. DOI: 10.1109/ICCA51439.2020.9264499.10.1109/ICCA51439.2020.9264499 Search in Google Scholar

104. Alnefaie, S., S. Alshehri, A. Cherif. A Survey on Access Control in IoT: Models, Architectures and Research Opportunities. – International Journal of Security and Networks (IJSN), Vol. 16, 2021, No 1, pp. 60-76.10.1504/IJSN.2021.112837 Search in Google Scholar

eISSN:
1314-4081
Langue:
Anglais
Périodicité:
4 fois par an
Sujets de la revue:
Computer Sciences, Information Technology