نتایج جستجو برای: abac

تعداد نتایج: 142  

Journal: :Journal of Sensors 2022

In the open Internet environment, there is a cross-platform access control problem that when tenant needs to business resources of other collaborative platforms through cloud service platform, platform only supports within platform. When tenants need authorization method static and granularity coarse-grained, so dynamic fine-grained not supported. To solve above problems, based on ABAC, this pa...

Journal: :World Wide Web 2021

Auditing provides essential security control in computer systems by keeping track of all access attempts, including both legitimate and illegal attempts. This phase can be useful the context audits, where eventual misbehaving parties held accountable. Blockchain technology provide trusted auditability required for systems. In this paper, we propose a distributed Attribute-Based Access Control (...

Journal: :Managerial and Decision Economics 2021

This study analyzes whether firms manipulate size reports in order to seem as if they have not grown due size-dependent policies. The small-and-medium enterprises (SMEs) support policies of Korean provide various benefits such tax reduction companies with a sales lower than certain standard. SMEs thus an inventive discretionally manage figures hold on benefits. empirically tests listed the Stoc...

Journal: :International journal of electrical and computer engineering systems 2022

The security and privacy issues regarding outsourcing data have risen significantly as cloud computing has grown in demand. Consequently, since management been delegated to an untrusted server the phase, access control identified a major problem storage systems. To overcome this problem, paper, of using Attribute-Based Access Control (ABAC) approach is utilized. First, must be stored strong for...

Journal: :SN computer science 2021

Abstract The high increase in the use of graph databases also for business- and privacy-critical applications demands a sophisticated, flexible, fine-grained authorization access control (AC) approach. Attribute-based (ABAC) supports definition rules policies. Attributes can be associated with subject, requested resource action, but environment. Thus, this is promising starting point. However, ...

2016
Asma Alshehri Ravi Sandhu

Several access control models that use attributes have been proposed, although none so far is regarded as a definitive characterization of attribute-based access control (ABAC). Among these a recently proposed model is the attribute-based access matrix (ABAM) model [14] that extends the HRU model [4] by introducing attributes. In this paper we consider the finite case of ABAM, where the number ...

2017
Smriti Bhatt Farhan Patwa Ravi S. Sandhu

Internet of Things (IoT) has received considerable attention in both industry and academia in recent years. There has been significant research on access control models for IoT in academia, while industrial deployment of several cloud-enabled IoT platforms have already been introduced. However, as yet there is no consensus on a formal access control model for cloud-enabled IoT. Currently, most ...

2011
Tom Goovaerts Lieven Desmet Wouter Joosen

The correct deployment and enforcement of expressive attribute-based access control (ABAC) policies in large distributed systems is a significant challenge. The enforcement of such policies requires policydependent collaborations between many distributed entities. In existing authorization systems, such collaborations are static and must be configured and verified manually by administrators. Th...

2015
Malik Imran Daud David Sánchez Alexandre Viejo

Delegation of access control (i.e. transferring access rights on a resource to another tenant) is crucial to efficiently decentralize the access control management in large and dynamic scenarios. Most of the delegation methods available in the literature are based on the RBAC or ABAC models. However, their applicability can be hampered by: i) the effort required to manage and enforce multiple r...

2012
Hadiseh Seyyed Alipour Mehdi Sabbari

Access control has been found to be one of the effective ways of insuring that only authorized users have access to the information resources to perform their job function. The overall objective of any access control policy rule is to define, sensitive information may be disclosed when, why, how and to whom. In one hand resources should be protected against unauthorized access and in the other ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید