Gupta et al., 2023 - Google Patents
Ontology-based evaluation of ABAC policies for inter-organizational resource sharingGupta et al., 2023
- Document ID
- 13543462009463874278
- Author
- Gupta T
- Sural S
- Publication year
- Publication venue
- Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics
External Links
Snippet
Attribute-based Access Control (ABAC), as the name suggests, determines whether an access request be granted based on the attributes or characteristics of the requesting user, those of the requested resource, and the environmental condition in which the request is …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ferrari | Access Control in Data Management Systems: A Visual Querying Perspective | |
Bertino et al. | Database security-concepts, approaches, and challenges | |
Adam et al. | A content-based authorization model for digital libraries | |
CN103745161B (en) | Access method of controlling security and device | |
Wishart et al. | Collaborative privacy policy authoring in a social networking context | |
De Capitani di Vimercati et al. | Private data indexes for selective access to outsourced data | |
Chen et al. | Data access control based on blockchain in medical cyber physical systems | |
Foresti | Preserving privacy in data outsourcing | |
Jahid et al. | MyABDAC: compiling XACML policies for attribute-based database access control | |
Gupta et al. | Ontology-based evaluation of ABAC policies for inter-organizational resource sharing | |
Demichev et al. | Business process engineering for data storing and processing in a collaborative distributed environment based on provenance metadata, smart contracts and blockchain technology | |
Yau et al. | A privacy preserving repository for data integration across data sharing services | |
Psarra et al. | Securing access to healthcare data with context-aware policies | |
di Vimercati et al. | Digital infrastructure policies for data security and privacy in smart cities | |
Jebali et al. | Secure data outsourcing in presence of the inference problem: issues and directions | |
Livraga | Protecting privacy in data release | |
Lobo | Relationship‐based access control: More than a social network access control model | |
Xu et al. | Blockchain-based secure data sharing with overlapping clustering and searchable encryption | |
Jiang et al. | MediRAG: Secure Question Answering for Healthcare Data | |
Diao et al. | A smart role mapping recommendation system | |
Valzelli et al. | A Fine-grained Access Control Model for Knowledge Graphs. | |
Imran-Daud | Ontology-based Access Control in Open Scenarios: Applications to Social Networks and the Cloud | |
Wang et al. | Usable access control in collaborative environments: Authorization based on people-tagging | |
Cho et al. | Privacy-preserving similarity measurement for access control policies | |
Ma et al. | RTBAC: A Risk‐Aware Topic‐Based Access Control Model for Text Data with Paragraph‐Level Authorization |