Pattabhi et al., 2022 - Google Patents
Intent based access for policy controlPattabhi et al., 2022
- Document ID
- 2632041317912388382
- Author
- Pattabhi M
- Konala T
- Publication year
- Publication venue
- 2022 International Conference on Breakthrough in Heuristics And Reciprocation of Advanced Technologies (BHARAT)
External Links
Snippet
Access control Policies (ACP) are defined as a set of rules that specify who should have access to resources and what resources they should have access to. These ACPs are specific to the organization and are confidential to it. ACPs in Role Based Access Control …
- 238000007635 classification algorithm 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ferraiolo et al. | Extensible access control markup language (XACML) and next generation access control (NGAC) | |
US11140194B2 (en) | Measuring and comparing security efficiency and importance in virtualized environments | |
US8479302B1 (en) | Access control via organization charts | |
CN103530106B (en) | Method and system of context-dependent transactional management for separation of duties | |
Son et al. | Towards a fine-grained access control mechanism for privacy protection and policy conflict resolution | |
Riad et al. | AR-ABAC: a new attribute based access control model supporting attribute-rules for cloud computing | |
US20230370473A1 (en) | Policy scope management | |
Li et al. | A sticky policy framework for big data security | |
Damen et al. | CollAC: Collaborative access control | |
CA3103393A1 (en) | Method and server for access verification in an identity and access management system | |
Jiang et al. | Risk and UCON-based access control model for healthcare big data | |
US20170163684A1 (en) | Electronic access controls | |
Kumar et al. | Content sensitivity based access control framework for Hadoop | |
Alkhresheh et al. | Context-aware automatic access policy specification for iot environments | |
Hasani et al. | Criteria specifications for the comparison and evaluation of access control models | |
Morelli et al. | Audit-based access control with a distributed ledger: Applications to healthcare organizations | |
Wang et al. | A trust and attribute-based access control framework in internet of things | |
Moghaddam et al. | Federated policy management engine for reliable cloud computing | |
Pattabhi et al. | Intent based access for policy control | |
Ed-Daibouni et al. | Toward a new extension of the access control model ABAC for cloud computing | |
Auxilia et al. | Ontology centric access control mechanism for enabling data protection in cloud | |
Díaz Ferreyra et al. | Access-control prediction in social network sites: Examining the role of homophily | |
Ma et al. | RTBAC: A Risk‐Aware Topic‐Based Access Control Model for Text Data with Paragraph‐Level Authorization | |
Wang et al. | Usable access control in collaborative environments: Authorization based on people-tagging | |
Koot | Introduction to Access Control (v4) |