XACML ≈ XACML
View article
A blockchain based approach for the definition of auditable Access Control systems Open
This work proposes to exploit blockchain technology to define Access Control systems that guarantee the auditability of access control policies evaluation. The key idea of our proposal is to codify attribute-based Access Control policies a…
View article
A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control Open
Access control is fundamental and prerequisite to govern and safeguard information assets within an organisation. Organisations generally use web enabled remote access coupled with applications access distributed on the various networks fa…
View article
XACML for Building Access Control Policies in Internet of Things Open
Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized u…
View article
Label-Based Access Control Open
There are two major techniques for specifying authorization policies in Attribute Based Access Control (ABAC) models. The more conventional approach is to define policies by using logical formulas involving attribute values. Examples in th…
View article
Self sovereign and blockchain based access control: Supporting attributes privacy with zero knowledge Open
Recent years have witnessed, especially in Europe, a shift aimed at bringing users back at the center of digital systems. This has driven innovation towards the affirmation of decentralized systems, in line with the Self Sovereign Identity…
View article
An Architecture for Providing Data Usage and Access Control in Data Sharing Ecosystems Open
We are experiencing a new digital revolution in which data are becoming a key pillar for business and industry. Promoting data sharing, without compromising data sovereignty and traceability, is fundamental since it provides a heterogeneou…
View article
ABAC with Group Attributes and Attribute Hierarchies Utilizing the Policy Machine Open
Attribute-Based Access Control (ABAC) has received significant attention in recent years, although the concept has been around for over two decades now. Many ABAC models, with different variations, have been proposed and formalized. Beside…
View article
An Efficient Attribute-Based Access Control (ABAC) Policy Retrieval Method Based on Attribute and Value Levels in Multimedia Networks Open
Internet of Multimedia Things (IoMT) brings convenient and intelligent services while also bringing huge challenges to multimedia data security and privacy. Access control is used to protect the confidentiality and integrity of restricted …
View article
Adaptive context-aware access control for IoT environments leveraging fog computing Open
The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from unauthorized access. A cloud-based access control approach brings significant challenges in t…
View article
A verified algorithm for detecting conflicts in XACML access control rules Open
The goal of this thesis is to find provably correct methods for detecting conflicts between XACML rules. A conflict occurs when one rule permits a request and another denies that same request. As XACML deals with access control, we can hel…
View article
Analysis and Verification of XACML Policies in a Medical Cloud Environment Open
The connectivity of devices, machines and people via Cloud infrastructure can support collaborations among doctors and specialists from different medical organisations. Such collaborations may lead to data sharing and joint tasks and activ…
View article
Secure data access control with perception reasoning Open
In spite of all security issues in the cloud system, distributed cloud environment requires an access control model which should be context aware to handle all issues intelligently. It must include role activation process based on the user…
View article
Automated Policy Combination for Secure Data Sharing in Cross-Organizational Collaborations Open
During business collaborations, multiple participating organizations often need to share data for common interests. In such cases, it is necessary to combine local policies from different organizations into a global one in order to manage …
View article
Privacy-aware relationship semantics–based XACML access control model for electronic health records in hybrid cloud Open
State-of-the-art progress in cloud computing encouraged the healthcare organizations to outsource the management of electronic health records to cloud service providers using hybrid cloud. A hybrid cloud is an infrastructure consisting of …
View article
Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization Open
The increasing popularity of remote Cloud File Sharing (CFS) has become a major concern for privacy breach of sensitive data. Aiming at this concern, we present a new resource sharing framework by integrating enterprise-side Attribute-Base…
View article
Automated Coverage-Based Testing of XACML Policies Open
While the standard language XACML is very expressive for specifying fine-grained access control policies, defects can get into XACML policies for various reasons, such as misunderstanding of access control requirements, omissions, and codi…
View article
A Decentralized Blockchain-based Architecture for a Secure Cloud-Enabled IoT Open
The integration of cloud computing and Internet of Things (IoT) offers a promising, rich platform for data collection and analysis in smart healthcare. In such a model, IoT devices collect data about patient health status through multiple …
View article
An automated model-based test oracle for access control systems Open
In the context of XACML-based access control systems, an intensive testing activity is among the most adopted means to assure that sensible information or resources are correctly accessed. Unfortunately, it requires a huge effort for manua…
View article
Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements Open
Access control policies (ACPs) are natural language statements that describe criteria under which users can access resources. We focus on constructing NIST Next Generation Access Control (NGAC) ABAC model from ACP statements. NGAC is more …
View article
XACML Implementation Based on Graph Databases Open
Extensible Access Control Markup Language (XACML) is an OASIS standard for security policy specification. It consists of a policy language to define security authorizations and an access control decision language for requests and responses…
View article
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems. Open
An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have…
View article
Towards Secure Collaboration in Federated Cloud Environments Open
Public administrations across Europe have been actively following and adopting cloud paradigms at various degrees. By establishing modern data centers and consolidating their infrastructures, many organizations already benefit from a range…
View article
XACML for Mobility (XACML4M)—An Access Control Framework for Connected Vehicles Open
The automotive industry is experiencing a transformation with the rapid integration of software-based systems inside vehicles, which are complex systems with multiple sensors. The use of vehicle sensor data has enabled vehicles to communic…
View article
Trust Management in Decentralized IoT Access Control System Open
Heterogeneous and dynamic IoT environments require a lightweight, scalable, and trustworthy access control system for protection from unauthorized access and for automated detection of compromised nodes. Recent proposals in IoT access cont…
View article
In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control Open
Attribute-Based Access Control (ABAC) systems are using machine-readable rules for making access control decisions. Rules are collected in documents, the named policies, or policy sets. These are expressed in a specific policy language, su…
View article
Architecture for Enhancing Communication Security with RBAC IoT Protocol-Based Microgrids Open
In traditional power grids, the unidirectional flow of energy and information has led to a decrease in efficiency. To address this issue, the concept of microgrids with bidirectional flow and independent power sources has been introduced. …
View article
Research on Access Control Scheme of System Wide Information Management Based on Attribute Association Open
System wide information management (SWIM) involves civil aviation system control, intelligence, alarm, traffic, and other data. These data are transmitted in various forms, making SWIM system vulnerable to sensitive information leakage, da…
View article
A Formal Validation Approach for XACML 3.0 Access Control Policy Open
Access control systems represent a security mechanism to regulate the access to system resources, and XACML is the standard language for specifying, storing and deploying access control policies. The verbosity and complexity of XACML synta…
View article
Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism Open
During the last decade, organizations have been more and more aware of the benefits of engaging in collaborative activities. To attain a required collaborative objective, they are obligated to share sensitive resources such as data, servic…
View article
Unified Access Management for Digital Evidence Storage: Integrating Attribute-based and Role-based Access Control with XACML Open
Digital evidence is stored in digital evidence storage. An access control system is crucial in situations where not all users can access digital evidence, ensuring that each user's access is limited to what is essential for them to do thei…