[go: up one dir, main page]

Pattabhi et al., 2022 - Google Patents

Intent based access for policy control

Pattabhi et al., 2022

Document ID
2632041317912388382
Author
Pattabhi M
Konala T
Publication year
Publication venue
2022 International Conference on Breakthrough in Heuristics And Reciprocation of Advanced Technologies (BHARAT)

External Links

Snippet

Access control Policies (ACP) are defined as a set of rules that specify who should have access to resources and what resources they should have access to. These ACPs are specific to the organization and are confidential to it. ACPs in Role Based Access Control …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application

Similar Documents

Publication Publication Date Title
Ferraiolo et al. Extensible access control markup language (XACML) and next generation access control (NGAC)
US11140194B2 (en) Measuring and comparing security efficiency and importance in virtualized environments
US8479302B1 (en) Access control via organization charts
CN103530106B (en) Method and system of context-dependent transactional management for separation of duties
Son et al. Towards a fine-grained access control mechanism for privacy protection and policy conflict resolution
Riad et al. AR-ABAC: a new attribute based access control model supporting attribute-rules for cloud computing
US20230370473A1 (en) Policy scope management
Li et al. A sticky policy framework for big data security
Damen et al. CollAC: Collaborative access control
CA3103393A1 (en) Method and server for access verification in an identity and access management system
Jiang et al. Risk and UCON-based access control model for healthcare big data
US20170163684A1 (en) Electronic access controls
Kumar et al. Content sensitivity based access control framework for Hadoop
Alkhresheh et al. Context-aware automatic access policy specification for iot environments
Hasani et al. Criteria specifications for the comparison and evaluation of access control models
Morelli et al. Audit-based access control with a distributed ledger: Applications to healthcare organizations
Wang et al. A trust and attribute-based access control framework in internet of things
Moghaddam et al. Federated policy management engine for reliable cloud computing
Pattabhi et al. Intent based access for policy control
Ed-Daibouni et al. Toward a new extension of the access control model ABAC for cloud computing
Auxilia et al. Ontology centric access control mechanism for enabling data protection in cloud
Díaz Ferreyra et al. Access-control prediction in social network sites: Examining the role of homophily
Ma et al. RTBAC: A Risk‐Aware Topic‐Based Access Control Model for Text Data with Paragraph‐Level Authorization
Wang et al. Usable access control in collaborative environments: Authorization based on people-tagging
Koot Introduction to Access Control (v4)