Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

55 results
Keywords : Access control
Image document

Secure and Authenticated Access to LLN Resources Through Policy Constraints

Konstantinos Rantos , Konstantinos Fysarakis , Othonas Soultatos , Ioannis Askoxylakis
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.271-280, ⟨10.1007/978-3-319-24018-3_18⟩
Conference papers hal-01442549v1
Image document

Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques

Masoud Narouei , Hassan Takabi
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.137-152, ⟨10.1007/978-3-319-24018-3_9⟩
Conference papers hal-01442558v1
Image document

Access Control and Query Verification for Untrusted Databases

Rohit Jain , Sunil Prabhakar
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.211-225, ⟨10.1007/978-3-642-39256-6_14⟩
Conference papers hal-01490706v1
Image document

Re-designing the Web’s Access Control System

Wenliang Du , Xi Tan , Tongbo Luo , Karthick Jayaraman , Zutao Zhu
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.4-11, ⟨10.1007/978-3-642-22348-8_2⟩
Conference papers hal-01586586v1
Image document

An ABAC Model with Trust and Gossiping (ABAC–TG) for Online Social Networks

Adi Swissa , Ehud Gudes
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.377-392, ⟨10.1007/978-3-030-81242-3_22⟩
Conference papers hal-03677023v1
Image document

Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems

Antonios Gouglidis , Ioannis Mavridis
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.38-53, ⟨10.1007/978-3-642-21040-2_3⟩
Conference papers hal-01573308v1
Image document

A User-to-User Relationship-Based Access Control Model for Online Social Networks

Yuan Cheng , Jaehong Park , Ravi Sandhu
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.8-24, ⟨10.1007/978-3-642-31540-4_2⟩
Conference papers hal-01534764v1
Image document

A Model for Trust-Based Access Control and Delegation in Mobile Clouds

Indrajit Ray , Dieudonne Mulamba , Indrakshi Ray , Keesook J. Han
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.242-257, ⟨10.1007/978-3-642-39256-6_16⟩
Conference papers hal-01490708v1
Image document

Secure Resource Sharing for Embedded Protected Module Architectures

Jo Van Bulck , Job Noorman , Jan Tobias Mühlberg , Frank Piessens
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers hal-01442554v1
Image document

Type Checking Privacy Policies in the π-calculus

Dimitrios Kouzapas , Anna Philippou
35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.181-195, ⟨10.1007/978-3-319-19195-9_12⟩
Conference papers hal-01767337v1
Image document

Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

Jason Crampton , James Sellwood
30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.96-105, ⟨10.1007/978-3-319-41483-6_7⟩
Conference papers hal-01633675v1
Image document

Attribute-Aware Relationship-Based Access Control for Online Social Networks

Yuan Cheng , Jaehong Park , Ravi Sandhu
28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.292-306, ⟨10.1007/978-3-662-43936-4_19⟩
Conference papers hal-01284863v1
Image document

An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models

Xiaofeng Xia
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.185-194, ⟨10.1007/978-3-642-40779-6_16⟩
Conference papers hal-01492820v1
Image document

Information Security Theory and Practice

Maryline Laurent , Thanassis Giannetsos
Springer, LNCS-12024, pp.(X-253), 2020, Lecture Notes in Computer Science, 978-3-030-41701-7. ⟨10.1007/978-3-030-41702-4⟩
Books hal-03173895v1
Image document

Blockchain Based Access Control

Damiano Di Francesco Maesa , Paolo Mori , Laura Ricci
17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2017, Neuchâtel, Switzerland. pp.206-220, ⟨10.1007/978-3-319-59665-5_15⟩
Conference papers hal-01800124v1
Image document

Towards User-Oriented RBAC Model

Haibing Lu , Yuan Hong , Yanjiang Yang , Lian Duan , Nazia Badar
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.81-96, ⟨10.1007/978-3-642-39256-6_6⟩
Conference papers hal-01490719v1
Image document

Foundations for Designing, Defining, Validating and Executing Access Control Policies in Cloud Environments

Simeon Veloudis , Iraklis Paraskakis , Christos Petsos
6th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2017, Oslo, Norway. pp.75-82, ⟨10.1007/978-3-319-67262-5_6⟩
Conference papers hal-01677625v1
Image document

When Both Transmitting and Receiving Energies Matter: An Application of Network Coding in Wireless Body Area Networks

Xiaomeng Shi , Muriel Médard , Daniel E. Lucani
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.119-128, ⟨10.1007/978-3-642-23041-7_12⟩
Conference papers hal-01587861v1
Image document

Multiparty Authorization Framework for Data Sharing in Online Social Networks

Hongxin Hu , Gail-Joon Ahn
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.29-43, ⟨10.1007/978-3-642-22348-8_5⟩
Conference papers hal-01586571v1
Image document

Integrating Attributes into Role-Based Access Control

Qasim Mahmood Rajpoot , Christian Damsgaard Jensen , Ram Krishnan
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.242-249, ⟨10.1007/978-3-319-20810-7_17⟩
Conference papers hal-01745833v1
Image document

From MDM to DB2: A Case Study of Security Enforcement Migration

Nikolay Yakovets , Jarek Gryz , Stephanie Hazlewood , Paul Van Run
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers hal-01534771v1
Image document

Certificate-Based Encryption Scheme with General Access Structure

Tomasz Hyla , Jerzy Pejaś
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.41-55, ⟨10.1007/978-3-642-33260-9_3⟩
Conference papers hal-01551717v1
Image document

Identification of Access Control Policy Sentences from Natural Language Policy Documents

Masoud Narouei , Hamed Khanpour , Hassan Takabi
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.82-100, ⟨10.1007/978-3-319-61176-1_5⟩
Conference papers hal-01684368v1
Image document

Usage Control Model Specification in XACML Policy Language

Um E-Ghazia , Rahat Masood , Muhammad Awais Shibli , Muhammad Bilal
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.68-79, ⟨10.1007/978-3-642-33260-9_5⟩
Conference papers hal-01551723v1
Image document

Network Functions Virtualization Access Control as a Service

Manel Smine , David Espes , Nora Cuppens-Boulahia , Frédéric Cuppens
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.100-117, ⟨10.1007/978-3-030-49669-2_6⟩
Conference papers hal-03243624v1
Image document

JACPoL: A Simple but Expressive JSON-based Access Control Policy Language

Hao Jiang , Ahmed Bouabdallah
WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers hal-01802720v1
Image document

Object-Tagged RBAC Model for the Hadoop Ecosystem

Maanak Gupta , Farhan Patwa , Ravi Sandhu
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.63-81, ⟨10.1007/978-3-319-61176-1_4⟩
Conference papers hal-01684349v1
Image document

Towards a Pervasive Access Control within Video Surveillance Systems

Dana Al Kukhun , Dana Codreanu , Ana-Maria Manzat , Florence Sèdes
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.289-303, ⟨10.1007/978-3-642-40511-2_20⟩
Conference papers hal-01217394v1
Image document

SocACL: An ASP-Based Access Control Language for Online Social Networks

Edward Caprin , Yan Zhang
14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.207-210, ⟨10.1007/978-3-642-40779-6_20⟩
Conference papers hal-01492825v1
Image document

Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System

Annanda Thavymony Rath , Jean-Noël Colin
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.233-241, ⟨10.1007/978-3-319-20810-7_16⟩
Conference papers hal-01745825v1