-
1
-
-
24944578141
-
-
EPAL 1.2
-
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter., M., 2003. Enterprise Privacy Authorization Language (EPAL 1.2).
-
(2003)
Enterprise Privacy Authorization Language
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
2
-
-
85047409276
-
Integration of cloud computing with internet of things: Challenges and open issues
-
Atlam, H.F., Alenezi, A., Alharthi, A., Walters, R., Wills, G., 2017a. Integration of cloud computing with internet of things: challenges and open issues. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). pp. 670–675.
-
(2017)
2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
, pp. 670-675
-
-
Atlam, H.F.1
Alenezi, A.2
Alharthi, A.3
Walters, R.4
Wills, G.5
-
3
-
-
85047853414
-
Validation of an Adaptive Risk-based Access Control Model for the Internet of Things
-
Atlam, H.F., Alenezi, A., Hussein, R.K., Wills, G.B., 2018. Validation of an Adaptive Risk-based Access Control Model for the Internet of Things. I.J. Comput. Netw. Inf. Secur. 26–35.
-
(2018)
I.J. Comput. Netw. Inf. Secur.
, pp. 26-35
-
-
Atlam, H.F.1
Alenezi, A.2
Hussein, R.K.3
Wills, G.B.4
-
4
-
-
85024399591
-
An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things
-
Atlam, H.F., Alenezi, A., Walters, R.J., Wills, G.B., 2017b. An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things. In: Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017). pp. 254–260.
-
(2017)
Proceedings of The 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017)
, pp. 254-260
-
-
Atlam, H.F.1
Alenezi, A.2
Walters, R.J.3
Wills, G.B.4
-
5
-
-
85047402656
-
Developing an adaptive Risk-based access control model for the Internet of Things
-
Atlam, H.F., Alenezi, A., Walters, R.J., Wills, G.B., Daniel, J., 2017c. Developing an adaptive Risk-based access control model for the Internet of Things. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). pp. 655–661.
-
(2017)
2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
, pp. 655-661
-
-
Atlam, H.F.1
Alenezi, A.2
Walters, R.J.3
Wills, G.B.4
Daniel, J.5
-
6
-
-
85030858737
-
Comparative Study on CBIR based on Color Feature
-
Atlam, H.F., Attiya, G., El-Fishawy, N., 2013. Comparative Study on CBIR based on Color Feature. Int. J. Comput. Appl. 78, 975–8887.
-
(2013)
Int. J. Comput. Appl.
, vol.78
, pp. 975-8887
-
-
Atlam, H.F.1
Attiya, G.2
El-Fishawy, N.3
-
7
-
-
85047859070
-
Integration of Color and Texture Features in CBIR System
-
Atlam, H.F., Attiya, G., El-Fishawy, N., 2017d. Integration of Color and Texture Features in CBIR System. Int. J. Comput. Appl. 164, 23–28.
-
(2017)
Int. J. Comput. Appl.
, vol.164
, pp. 23-28
-
-
Atlam, H.F.1
Attiya, G.2
El-Fishawy, N.3
-
9
-
-
84893591320
-
A framework for risk-aware role based access control
-
Bijon, K.Z., Krishnan, R., Sandhu, R., 2013. A framework for risk-aware role based access control. 2013 IEEE Conf. Commun. Netw. Secur. 462–469.
-
(2013)
2013 IEEE Conf. Commun. Netw. Secur.
, pp. 462-469
-
-
Bijon, K.Z.1
Krishnan, R.2
Sandhu, R.3
-
10
-
-
85047891952
-
Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies
-
Bugiel, S., Heuser, S., Sadeghi, A.-R., 2013. Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies. Proc. 22nd USENIX Secur. Symp. 131–146.
-
(2013)
Proc. 22nd USENIX Secur. Symp.
, pp. 131-146
-
-
Bugiel, S.1
Heuser, S.2
Sadeghi, A.-R.3
-
13
-
-
33947625881
-
Assessment of access control systems
-
Hu, V.C.V., Ferraiolo, D.F., Kuhn, D.R., 2006. Assessment of access control systems. Nistir 7316 60.
-
(2006)
Nistir
, vol.7316
, pp. 60
-
-
Hu, V.C.V.1
Ferraiolo, D.F.2
Kuhn, D.R.3
-
14
-
-
30744448197
-
Context sensitive access control
-
Hulsebosch, R.J., Salden, A.H., Bargh, M.S., Ebben, P.W.G., Reitsma, J., 2005. Context sensitive access control. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies. pp. 111–119.
-
(2005)
Proceedings of The Tenth ACM Symposium on Access Control Models and Technologies
, pp. 111-119
-
-
Hulsebosch, R.J.1
Salden, A.H.2
Bargh, M.S.3
Ebben, P.W.G.4
Reitsma, J.5
-
15
-
-
85051948096
-
On Access Control in the Internet of Things
-
Janak, J., Nam, H., Schulzrinne, H., 2012. On Access Control in the Internet of Things. Lix.Polytechnique.Fr 1–3.
-
(2012)
Lix.Polytechnique.Fr
, pp. 1-3
-
-
Janak, J.1
Nam, H.2
Schulzrinne, H.3
-
16
-
-
85051963924
-
Understanding XACML policy langauge
-
Jayasekara, A., 2011. Understanding XACML policy langauge. Int. J. Inf. Technol. 35–68.
-
(2011)
Int. J. Inf. Technol.
, pp. 35-68
-
-
Jayasekara, A.1
-
17
-
-
84873425163
-
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
-
Jin, X., Krishnan, R., Sandhu, R.S., 2012. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. DBSec 12, 41–55.
-
(2012)
DBSec
, vol.12
, pp. 41-55
-
-
Jin, X.1
Krishnan, R.2
Sandhu, R.S.3
-
18
-
-
15944413918
-
Context sensitivity in role-based access control
-
Kumar, A., Karnik, N.M., Chafle, G., 2002. Context sensitivity in role-based access control. Oper. Syst. Rev. 36, 53–66.
-
(2002)
Oper. Syst. Rev.
, vol.36
, pp. 53-66
-
-
Kumar, A.1
Karnik, N.M.2
Chafle, G.3
-
19
-
-
80052161697
-
A Survey of Privacy Policy Languages
-
Kumaraguru, P., Cranor, L., Lobo, J., Calo, S., 2007. A Survey of Privacy Policy Languages. In: Security, N SOUPS Workshop on Usable IT Management. pp. 35–40.
-
(2007)
Security, N SOUPS Workshop on Usable IT Management
, pp. 35-40
-
-
Kumaraguru, P.1
Cranor, L.2
Lobo, J.3
Calo, S.4
-
20
-
-
84887579599
-
XACML and risk-aware access control
-
T.J.N
-
Liang Chen, Luca Gasparini, and T.J.N., 2013. XACML and risk-aware access control. In: Proc. ICEIS,. pp. 66–75.
-
(2013)
Proc. ICEIS
, pp. 66-75
-
-
Chen, L.1
Gasparini, L.2
-
21
-
-
85045511338
-
-
Liu, C., Peng, Z., Wu, L., 2016. Role of Time-Domain Based Access Control Model 57–62.
-
(2016)
Role of Time-Domain Based Access Control Model
, pp. 57-62
-
-
Liu, C.1
Peng, Z.2
Wu, L.3
-
22
-
-
84866349735
-
Authentication and access control in the Internet of things
-
Liu, J., Xiao, Y., Chen, C.L.P., 2012. Authentication and access control in the Internet of things. Proc. - 32nd IEEE Int. Conf. Distrib. Comput. Syst. Work. ICDCSW 2012 588–592.
-
(2012)
Proc. - 32nd IEEE Int. Conf. Distrib. Comput. Syst. Work. ICDCSW 2012
, pp. 588-592
-
-
Liu, J.1
Xiao, Y.2
Chen, C.L.P.3
-
23
-
-
85051969249
-
-
Molloy, I., Dickens, L., Morisset, C., Cheng, P., Lobo, J., Russo, A., 2011. IBM Research Report Risk-Based Access Control Decisions under Uncertainty 25121.
-
(2011)
IBM Research Report Risk-Based Access Control Decisions Under Uncertainty 25121
-
-
Molloy, I.1
Dickens, L.2
Morisset, C.3
Cheng, P.4
Lobo, J.5
Russo, A.6
-
24
-
-
85002424663
-
Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things
-
N. P. Mahalle, , Anggorojati, B., Prasad, N.R., Prasad, R., 2013. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things. J. Cyber Secur. Mobil. 1, 309–348.
-
(2013)
J. Cyber Secur. Mobil.
, vol.1
, pp. 309-348
-
-
Mahalle, N.P.1
Anggorojati, B.2
Prasad, N.R.3
Prasad, R.4
-
28
-
-
84855407965
-
A Survey on Access Control Deployment
-
Suhendra, V., 2011. A Survey on Access Control Deployment. Commun. Comput. Inf. Sci. 11–20.
-
(2011)
Commun. Comput. Inf. Sci.
, pp. 11-20
-
-
Suhendra, V.1
-
29
-
-
84882675688
-
-
G.A.C.F.W.K.J.T.S.R.L.B.A
-
Turner, K.J., Stephan Rei -Marganiec Lynne Blair, G.A.C.F.W.K.J.T.S.R.L.B.A., Cambpell, G., Wang., F., 2014. Appel: Adaptable and programmable policy environment and language.
-
(2014)
Appel: Adaptable and Programmable Policy Environment and Language
-
-
Turner, K.J.1
Stephan Rei-Marganiec2
Lynne Blair3
Cambpell, G.4
Wang, F.5
-
30
-
-
84875664448
-
Access Control Policies and Languages in Open Environments
-
S.D.C. S, F., S, J., S, Springer, Boston, MA
-
Vimercati di, S S.D.C. S, F., S, J., P., S., 2007. Access Control Policies and Languages in Open Environments. In: Advances in Information Security. Springer, Boston, MA, pp. 21–58.
-
(2007)
Advances in Information Security
, pp. 21-58
-
-
Vimercati di, S.1
-
33
-
-
84905122477
-
Secure administration of cryptographic role-based access control for large-scale cloud storage systems
-
Zhou, L., Varadharajan, V., Hitchens, M., 2014a. Secure administration of cryptographic role-based access control for large-scale cloud storage systems. J. Comput. Syst. Sci. 80, 1518–1533.
-
(2014)
J. Comput. Syst. Sci.
, vol.80
, pp. 1518-1533
-
-
Zhou, L.1
Varadharajan, V.2
Hitchens, M.3
-
34
-
-
84905122477
-
Secure administration of cryptographic role-based access control for large-scale cloud storage systems
-
Zhou, L., Varadharajan, V., Hitchens, M., 2014b. Secure administration of cryptographic role-based access control for large-scale cloud storage systems. J. Comput. Syst. Sci. 80, 1518–1533.
-
(2014)
J. Comput. Syst. Sci.
, vol.80
, pp. 1518-1533
-
-
Zhou, L.1
Varadharajan, V.2
Hitchens, M.3
-
35
-
-
85051984293
-
A Practical Mandatory Access Control Model for XML Databases A Practical Mandatory Access Control Model for XML Databases
-
Zhu, H., Jin, R., 2007. A Practical Mandatory Access Control Model for XML Databases A Practical Mandatory Access Control Model for XML Databases. In: 2nd International Conference: Scalable Information Systems. pp. 1–4.
-
(2007)
2nd International Conference: Scalable Information Systems
, pp. 1-4
-
-
Zhu, H.1
Jin, R.2
-
36
-
-
77954464328
-
Cryptographic Role-based Security Mechanisms Based on Role-Key Hierarchy
-
Zhu, Y., Ahn, G.-J., Hu, H., Wang, H., 2010a. Cryptographic Role-based Security Mechanisms Based on Role-Key Hierarchy. Proc. 5th ACM Symp. Information, Comput. Commun. Secur. - ASIACCS’10 314.
-
(2010)
Proc. 5th ACM Symp. Information, Comput. Commun. Secur. - ASIACCS’10
, pp. 314
-
-
Zhu, Y.1
Ahn, G.-J.2
Hu, H.3
Wang, H.4
-
37
-
-
77954464328
-
Cryptographic Role-based Security Mechanisms Based on Role-Key Hierarchy
-
Zhu, Y., Ahn, G.-J., Hu, H., Wang, H., 2010b. Cryptographic Role-based Security Mechanisms Based on Role-Key Hierarchy. Proc. 5th ACM Symp. Information, Comput. Commun. Secur. - ASIACCS’10 314.
-
(2010)
Proc. 5th ACM Symp. Information, Comput. Commun. Secur. - ASIACCS’10
, pp. 314
-
-
Zhu, Y.1
Ahn, G.-J.2
Hu, H.3
Wang, H.4
|