[go: up one dir, main page]

Gupta et al., 2023 - Google Patents

Ontology-based evaluation of ABAC policies for inter-organizational resource sharing

Gupta et al., 2023

Document ID
13543462009463874278
Author
Gupta T
Sural S
Publication year
Publication venue
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics

External Links

Snippet

Attribute-based Access Control (ABAC), as the name suggests, determines whether an access request be granted based on the attributes or characteristics of the requesting user, those of the requested resource, and the environmental condition in which the request is …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Similar Documents

Publication Publication Date Title
Ferrari Access Control in Data Management Systems: A Visual Querying Perspective
Bertino et al. Database security-concepts, approaches, and challenges
Adam et al. A content-based authorization model for digital libraries
CN103745161B (en) Access method of controlling security and device
Wishart et al. Collaborative privacy policy authoring in a social networking context
De Capitani di Vimercati et al. Private data indexes for selective access to outsourced data
Chen et al. Data access control based on blockchain in medical cyber physical systems
Foresti Preserving privacy in data outsourcing
Jahid et al. MyABDAC: compiling XACML policies for attribute-based database access control
Gupta et al. Ontology-based evaluation of ABAC policies for inter-organizational resource sharing
Demichev et al. Business process engineering for data storing and processing in a collaborative distributed environment based on provenance metadata, smart contracts and blockchain technology
Yau et al. A privacy preserving repository for data integration across data sharing services
Psarra et al. Securing access to healthcare data with context-aware policies
di Vimercati et al. Digital infrastructure policies for data security and privacy in smart cities
Jebali et al. Secure data outsourcing in presence of the inference problem: issues and directions
Livraga Protecting privacy in data release
Lobo Relationship‐based access control: More than a social network access control model
Xu et al. Blockchain-based secure data sharing with overlapping clustering and searchable encryption
Jiang et al. MediRAG: Secure Question Answering for Healthcare Data
Diao et al. A smart role mapping recommendation system
Valzelli et al. A Fine-grained Access Control Model for Knowledge Graphs.
Imran-Daud Ontology-based Access Control in Open Scenarios: Applications to Social Networks and the Cloud
Wang et al. Usable access control in collaborative environments: Authorization based on people-tagging
Cho et al. Privacy-preserving similarity measurement for access control policies
Ma et al. RTBAC: A Risk‐Aware Topic‐Based Access Control Model for Text Data with Paragraph‐Level Authorization