[go: up one dir, main page]

Suárez et al., 2020 - Google Patents

Formalization of a security access control model for the 5G system

Suárez et al., 2020

View PDF
Document ID
15550831455024431264
Author
Suárez L
Espes D
Cuppens F
Bertin P
Phan C
Le Parc P
Publication year
Publication venue
2020 11th International Conference on Network of the Future (NoF)

External Links

Snippet

The race for implementing communication services over 5G has already begun. For this, network coverage is needed and resource sharing is a way to achieve it. Therefore, each provider enforces its own security requirements. Under this scenario, it is necessary to …
Continue reading at hal.science (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Similar Documents

Publication Publication Date Title
Han et al. A survey on policy languages in network and security management
US9386040B2 (en) Policy-based service management system
Dos Santos et al. A dynamic risk-based access control architecture for cloud computing
US11621961B2 (en) Method for managing a cloud computing system
Chandramouli et al. Attribute-based access control for microservices-based applications using a service mesh
Bradshaw et al. The KAoS policy services framework
Suárez et al. Formalization of a security access control model for the 5G system
Suárez et al. Managing secure inter-slice communication in 5G network slice chains
Jin et al. RB-GACA: an RBAC based grid access control architecture
Katsikogiannis et al. An identity and access management approach for SOA
Toktar et al. RSVP Policy Control using XACML.
Haber et al. Privileged Access Management (PAM)
Trujillo Securing network slices in 5th generation mobile networks
Suárez et al. On an Access Control Model enhancement for the 5G System
Mont et al. A systematic approach to privacy enforcement and policy compliance checking in enterprises
Zarca et al. Policy-based definition and policy for orchestration final report
Gallon et al. Making the Internet of Things More Reliable Thanks to Dynamic Access Control
Partanen et al. Device life cycle management requirements for identity and access management in the factory of future environment
Katsis et al. Zero-Trust Strategies for O-RAN Cellular Networks: Principles, Challenges and Research Directions
Yaici et al. Context-Aware Trust-Based Access Control for Ubiquitous Systems
Che et al. BABAC: An access control framework for network virtualization using user behaviors and attributes
Ahn et al. Role-based privilege management using attribute certificates and delegation
Mohammad et al. A multi-layer security enabled quality of service (QoS) management architecture
Liebrand et al. Role delegation for a distributed, unified RBAC/MAC
Graham et al. Access Control and Identity Management Frameworks for Multi Tenant Dabs Architectures