Mohamed et al., 2022 - Google Patents
A systematic literature review for authorization and access control: definitions, strategies and modelsMohamed et al., 2022
View PDF- Document ID
- 7464102836060107029
- Author
- Mohamed A
- Auer D
- Hofer D
- Küng J
- Publication year
- Publication venue
- International journal of web information systems
External Links
Snippet
Purpose Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently …
- 238000000034 method 0 abstract description 22
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mohamed et al. | A systematic literature review for authorization and access control: definitions, strategies and models | |
Wang et al. | Building access control policy model for privacy preserving and testing policy conflicting problems | |
Ferrari | Access Control in Data Management Systems: A Visual Querying Perspective | |
Hu et al. | Assessment of access control systems | |
Ferraiolo et al. | Extensible access control markup language (XACML) and next generation access control (NGAC) | |
Younis et al. | An access control model for cloud computing | |
Bertino et al. | Database security-concepts, approaches, and challenges | |
Shafiq et al. | Secure interoperation in a multidomain environment employing RBAC policies | |
Bertino | Data protection from insider threats | |
He et al. | Requirements-based access control analysis and policy specification (recaps) | |
Jha et al. | Enforcing separation of duty in attribute based access control systems | |
Eßmayr et al. | Access controls for federated database environments-taxonomy of design choices | |
Armando et al. | Risk-aware information disclosure | |
Vijayalakshmi et al. | Shared access control models for big data: a perspective study and analysis | |
Sellami et al. | A FCA framework for inference control in data integration systems | |
Mohamed et al. | Authorization strategies and classification of access control models | |
Vijayalakshmi et al. | Identifying considerable anomalies and conflicts in ABAC security policies | |
Abdelfattah et al. | A novel role-mapping algorithm for enhancing highly collaborative access control system | |
Fatema | Adding Privacy Protection to Policy Based Authorisation Systems | |
Belhadaoui et al. | A Role-Attribute Based Access Control Model for Dynamic Access Control in Hadoop Ecosystem. | |
Bargh et al. | On Usage Control in Relational Database Management Systems-Obligations and Their Enforcement in Joining Datasets | |
Zhou | Access control model and policies for collaborative environments. | |
Alaga et al. | Context based enforcement of authorization for privacy and security in identity management | |
Can | Semantic-Based Access Control for Data Resources | |
Moniruzzaman et al. | A study of privacy policy enforcement in access control models |