Lawal et al., 2022 - Google Patents
Attribute-Based Access Control PolicyLawal et al., 2022
- Document ID
- 5345794372609929530
- Author
- Lawal S
- Krishnan R
- Publication year
- Publication venue
- Secure Knowledge Management In The Artificial Intelligence Era: 9th International Conference, SKM 2021, San Antonio, TX, USA, October 8–9, 2021, Proceedings
External Links
- 238000012552 review 0 abstract description 37
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mohamed et al. | A systematic literature review for authorization and access control: definitions, strategies and models | |
| Kamboj et al. | User authentication using Blockchain based smart contract in role-based access control | |
| Thakare et al. | PARBAC: Priority-attribute-based RBAC model for azure IoT cloud | |
| CN102299915B (en) | Access control based on Internet statement | |
| Majumder et al. | Taxonomy and classification of access control models for cloud environments | |
| Almenárez et al. | TrustAC: Trust-based access control for pervasive devices | |
| Merlec et al. | SC-CAAC: A smart-contract-based context-aware access control scheme for blockchain-enabled IoT systems | |
| Bouras et al. | IoT-CCAC: a blockchain-based consortium capability access control approach for IoT | |
| Hu et al. | Blockchain for access control systems | |
| Dias et al. | Blockchain for access control in e-health scenarios | |
| Riad et al. | AR-ABAC: a new attribute based access control model supporting attribute-rules for cloud computing | |
| Gonzalez et al. | A framework for authentication and authorization credentials in cloud computing | |
| Jin et al. | Role and attribute based collaborative administration of intra-tenant cloud iaas | |
| Rashid et al. | RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations | |
| Liu et al. | DF-RBAC: Dynamic and fine-grained role-based access control scheme with smart contract | |
| Rahman et al. | Context-aware and dynamic role-based access control using blockchain | |
| Singh et al. | ITrust: identity and trust based access control model for healthcare system security | |
| Yialelis et al. | Role-based security for distributed object systems | |
| Martinelli et al. | On usage control for grid systems | |
| Bakir | New blockchain based special keys security model with path compression algorithm for big data | |
| Penelova | Hybrid role and attribute based access control applied in information systems | |
| Abdulrahman et al. | A Distributed Blockchain-based Access Control for the Internet of Things | |
| Ray et al. | A model for trust-based access control and delegation in mobile clouds | |
| Lawal et al. | Attribute-based access control policy review in permissioned blockchain | |
| Moravcik et al. | Overview of Access Control Mechanisms in Cloud Environments |