[go: up one dir, main page]

Lawal et al., 2022 - Google Patents

Attribute-Based Access Control Policy

Lawal et al., 2022

Document ID
5345794372609929530
Author
Lawal S
Krishnan R
Publication year
Publication venue
Secure Knowledge Management In The Artificial Intelligence Era: 9th International Conference, SKM 2021, San Antonio, TX, USA, October 8–9, 2021, Proceedings

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Similar Documents

Publication Publication Date Title
Mohamed et al. A systematic literature review for authorization and access control: definitions, strategies and models
Kamboj et al. User authentication using Blockchain based smart contract in role-based access control
Thakare et al. PARBAC: Priority-attribute-based RBAC model for azure IoT cloud
CN102299915B (en) Access control based on Internet statement
Majumder et al. Taxonomy and classification of access control models for cloud environments
Almenárez et al. TrustAC: Trust-based access control for pervasive devices
Merlec et al. SC-CAAC: A smart-contract-based context-aware access control scheme for blockchain-enabled IoT systems
Bouras et al. IoT-CCAC: a blockchain-based consortium capability access control approach for IoT
Hu et al. Blockchain for access control systems
Dias et al. Blockchain for access control in e-health scenarios
Riad et al. AR-ABAC: a new attribute based access control model supporting attribute-rules for cloud computing
Gonzalez et al. A framework for authentication and authorization credentials in cloud computing
Jin et al. Role and attribute based collaborative administration of intra-tenant cloud iaas
Rashid et al. RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations
Liu et al. DF-RBAC: Dynamic and fine-grained role-based access control scheme with smart contract
Rahman et al. Context-aware and dynamic role-based access control using blockchain
Singh et al. ITrust: identity and trust based access control model for healthcare system security
Yialelis et al. Role-based security for distributed object systems
Martinelli et al. On usage control for grid systems
Bakir New blockchain based special keys security model with path compression algorithm for big data
Penelova Hybrid role and attribute based access control applied in information systems
Abdulrahman et al. A Distributed Blockchain-based Access Control for the Internet of Things
Ray et al. A model for trust-based access control and delegation in mobile clouds
Lawal et al. Attribute-based access control policy review in permissioned blockchain
Moravcik et al. Overview of Access Control Mechanisms in Cloud Environments