Lazouski et al., 2008 - Google Patents
A survey of usage control in computer securityLazouski et al., 2008
View PDF- Document ID
- 17691939973900096293
- Author
- Lazouski A
- Martinelli F
- Mori P
- Publication year
- Publication venue
- Istituto di Informática e Telemática, CNR
External Links
Snippet
Protecting access to digital resources is one of the fundamental problems recognized in computer security. It yet remains a challenging problem to work out starting from the conception till implementation. Access control is a study which deals with the ability to permit …
- 230000004224 protection 0 abstract description 75
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lazouski et al. | Usage control in computer security: A survey | |
Fernandez-Buglioni | Security patterns in practice: designing secure architectures using software patterns | |
Ferraiolo et al. | Role-based access control | |
Younis et al. | An access control model for cloud computing | |
Mohamed et al. | A systematic literature review for authorization and access control: definitions, strategies and models | |
Hu et al. | Assessment of access control systems | |
EP2502144B1 (en) | Controlling resource access based on resource properties | |
Bertino | Data protection from insider threats | |
Hu et al. | Guidelines for access control system evaluation metrics | |
Lin et al. | Data protection models for service provisioning in the cloud | |
CN112738194A (en) | Access control system for safe operation and maintenance management | |
Rahman | Scalable role-based access control using the eos blockchain | |
WO2022051005A1 (en) | Chaining, triggering, and enforcing entitlements | |
Merlec et al. | SC-CAAC: A smart-contract-based context-aware access control scheme for blockchain-enabled IoT systems | |
Javed et al. | Blockchain-based logging to defeat malicious insiders: The case of remote health monitoring systems | |
Armando et al. | Attribute based access control for apis in spring security | |
Bailey | Self-adaptive Authorisation Infrastructures | |
Stach et al. | Can blockchains and data privacy laws be reconciled? A fundamental study of how privacy-aware blockchains are feasible | |
Marcelletti et al. | Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems | |
Cheng et al. | Oml: Open, monetizable, and loyal ai | |
Hameed et al. | A Blockchain-based Decentralised and Dynamic Authorisation Scheme for the Internet of Things | |
Gorla et al. | Dynamic management of capabilities in a network aware coordination language | |
US20220350900A1 (en) | Secure distribution of embedded policy | |
Belhadaoui et al. | A Role-Attribute Based Access Control Model for Dynamic Access Control in Hadoop Ecosystem. | |
Lazouski et al. | A survey of usage control in computer security |