[go: up one dir, main page]

Lazouski et al., 2008 - Google Patents

A survey of usage control in computer security

Lazouski et al., 2008

View PDF
Document ID
17691939973900096293
Author
Lazouski A
Martinelli F
Mori P
Publication year
Publication venue
Istituto di Informática e Telemática, CNR

External Links

Snippet

Protecting access to digital resources is one of the fundamental problems recognized in computer security. It yet remains a challenging problem to work out starting from the conception till implementation. Access control is a study which deals with the ability to permit …
Continue reading at www.iit.cnr.it (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Similar Documents

Publication Publication Date Title
Lazouski et al. Usage control in computer security: A survey
Fernandez-Buglioni Security patterns in practice: designing secure architectures using software patterns
Ferraiolo et al. Role-based access control
Younis et al. An access control model for cloud computing
Mohamed et al. A systematic literature review for authorization and access control: definitions, strategies and models
Hu et al. Assessment of access control systems
EP2502144B1 (en) Controlling resource access based on resource properties
Bertino Data protection from insider threats
Hu et al. Guidelines for access control system evaluation metrics
Lin et al. Data protection models for service provisioning in the cloud
CN112738194A (en) Access control system for safe operation and maintenance management
Rahman Scalable role-based access control using the eos blockchain
WO2022051005A1 (en) Chaining, triggering, and enforcing entitlements
Merlec et al. SC-CAAC: A smart-contract-based context-aware access control scheme for blockchain-enabled IoT systems
Javed et al. Blockchain-based logging to defeat malicious insiders: The case of remote health monitoring systems
Armando et al. Attribute based access control for apis in spring security
Bailey Self-adaptive Authorisation Infrastructures
Stach et al. Can blockchains and data privacy laws be reconciled? A fundamental study of how privacy-aware blockchains are feasible
Marcelletti et al. Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems
Cheng et al. Oml: Open, monetizable, and loyal ai
Hameed et al. A Blockchain-based Decentralised and Dynamic Authorisation Scheme for the Internet of Things
Gorla et al. Dynamic management of capabilities in a network aware coordination language
US20220350900A1 (en) Secure distribution of embedded policy
Belhadaoui et al. A Role-Attribute Based Access Control Model for Dynamic Access Control in Hadoop Ecosystem.
Lazouski et al. A survey of usage control in computer security