Suárez et al., 2020 - Google Patents
Formalization of a security access control model for the 5G systemSuárez et al., 2020
View PDF- Document ID
- 15550831455024431264
- Author
- Suárez L
- Espes D
- Cuppens F
- Bertin P
- Phan C
- Le Parc P
- Publication year
- Publication venue
- 2020 11th International Conference on Network of the Future (NoF)
External Links
Snippet
The race for implementing communication services over 5G has already begun. For this, network coverage is needed and resource sharing is a way to achieve it. Therefore, each provider enforces its own security requirements. Under this scenario, it is necessary to …
- 238000004891 communication 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Han et al. | A survey on policy languages in network and security management | |
| US9386040B2 (en) | Policy-based service management system | |
| Dos Santos et al. | A dynamic risk-based access control architecture for cloud computing | |
| US11621961B2 (en) | Method for managing a cloud computing system | |
| Chandramouli et al. | Attribute-based access control for microservices-based applications using a service mesh | |
| Bradshaw et al. | The KAoS policy services framework | |
| Suárez et al. | Formalization of a security access control model for the 5G system | |
| Suárez et al. | Managing secure inter-slice communication in 5G network slice chains | |
| Jin et al. | RB-GACA: an RBAC based grid access control architecture | |
| Katsikogiannis et al. | An identity and access management approach for SOA | |
| Toktar et al. | RSVP Policy Control using XACML. | |
| Haber et al. | Privileged Access Management (PAM) | |
| Trujillo | Securing network slices in 5th generation mobile networks | |
| Suárez et al. | On an Access Control Model enhancement for the 5G System | |
| Mont et al. | A systematic approach to privacy enforcement and policy compliance checking in enterprises | |
| Zarca et al. | Policy-based definition and policy for orchestration final report | |
| Gallon et al. | Making the Internet of Things More Reliable Thanks to Dynamic Access Control | |
| Partanen et al. | Device life cycle management requirements for identity and access management in the factory of future environment | |
| Katsis et al. | Zero-Trust Strategies for O-RAN Cellular Networks: Principles, Challenges and Research Directions | |
| Yaici et al. | Context-Aware Trust-Based Access Control for Ubiquitous Systems | |
| Che et al. | BABAC: An access control framework for network virtualization using user behaviors and attributes | |
| Ahn et al. | Role-based privilege management using attribute certificates and delegation | |
| Mohammad et al. | A multi-layer security enabled quality of service (QoS) management architecture | |
| Liebrand et al. | Role delegation for a distributed, unified RBAC/MAC | |
| Graham et al. | Access Control and Identity Management Frameworks for Multi Tenant Dabs Architectures |