Search - IFIP Open Digital Library Access content directly

Filter your results

90 results
level0_domain_s : Computer Science [cs]
Keywords : Access control
Image document

Foundations for Designing, Defining, Validating and Executing Access Control Policies in Cloud Environments

Simeon Veloudis , Iraklis Paraskakis , Christos Petsos
6th European Conference on Service-Oriented and Cloud Computing (ESOCC), Sep 2017, Oslo, Norway. pp.75-82, ⟨10.1007/978-3-319-67262-5_6⟩
Conference papers hal-01677625v1
Image document

OFELIA – A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management

Alexandre B. Augusto , Manuel Eduardo Correia
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.61-74, ⟨10.1007/978-3-642-30436-1_6⟩
Conference papers hal-01518233v1
Image document

When Both Transmitting and Receiving Energies Matter: An Application of Network Coding in Wireless Body Area Networks

Xiaomeng Shi , Muriel Médard , Daniel E. Lucani
International IFIP TC 6 Workshops PE-CRN, NC-Pro, WCNS, and SUNSET 2011 Held at NETWORKING 2011 (NETWORKING), May 2011, Valencia, Spain. pp.119-128, ⟨10.1007/978-3-642-23041-7_12⟩
Conference papers hal-01587861v1
Image document

Business Process-Based Legitimacy of Data Access Framework for Enterprise Information Systems Protection

Hind Benfenatki , Frédérique Biennier
12th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Sep 2018, Poznan, Poland. pp.146-160, ⟨10.1007/978-3-319-99040-8_12⟩
Conference papers hal-01878879v1
Image document

Multiparty Authorization Framework for Data Sharing in Online Social Networks

Hongxin Hu , Gail-Joon Ahn
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.29-43, ⟨10.1007/978-3-642-22348-8_5⟩
Conference papers hal-01586571v1
Image document

Privacy-Preserving Access Control in Publicly Readable Storage Systems

Daniel Bosk , Sonja Buchegger
David Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.327-342, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_22⟩
Book sections hal-01619745v1
Image document

Integrating Attributes into Role-Based Access Control

Qasim Mahmood Rajpoot , Christian Damsgaard Jensen , Ram Krishnan
29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.242-249, ⟨10.1007/978-3-319-20810-7_17⟩
Conference papers hal-01745833v1
Image document

From MDM to DB2: A Case Study of Security Enforcement Migration

Nikolay Yakovets , Jarek Gryz , Stephanie Hazlewood , Paul Van Run
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.207-222, ⟨10.1007/978-3-642-31540-4_16⟩
Conference papers hal-01534771v1
Image document

Certificate-Based Encryption Scheme with General Access Structure

Tomasz Hyla , Jerzy Pejaś
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.41-55, ⟨10.1007/978-3-642-33260-9_3⟩
Conference papers hal-01551717v1
Image document

Identification of Access Control Policy Sentences from Natural Language Policy Documents

Masoud Narouei , Hamed Khanpour , Hassan Takabi
31th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2017, Philadelphia, PA, United States. pp.82-100, ⟨10.1007/978-3-319-61176-1_5⟩
Conference papers hal-01684368v1
Image document

Usage Control Model Specification in XACML Policy Language

Um E-Ghazia , Rahat Masood , Muhammad Awais Shibli , Muhammad Bilal
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.68-79, ⟨10.1007/978-3-642-33260-9_5⟩
Conference papers hal-01551723v1
Image document

Network Functions Virtualization Access Control as a Service

Manel Smine , David Espes , Nora Cuppens-Boulahia , Frédéric Cuppens
34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.100-117, ⟨10.1007/978-3-030-49669-2_6⟩
Conference papers hal-03243624v1
Image document

Handling Stateful Firewall Anomalies

Frédéric Cuppens , Nora Cuppens-Boulahia , Joaquin Garcia Alfaro , Tarik Moataz , Xavier Rimasson
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.174-186, ⟨10.1007/978-3-642-30436-1_15⟩
Conference papers hal-00737170v1
Image document

JACPoL: A Simple but Expressive JSON-based Access Control Policy Language

Hao Jiang , Ahmed Bouabdallah
WISTP 2017 : 11th IFIP International Conference on Information Security Theory and Practice, Sep 2017, Heraklion, Crete, Greece. pp.56-72, ⟨10.1007/978-3-319-93524-9_4⟩
Conference papers hal-01802720v1
Image document

Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques

Masoud Narouei , Hassan Takabi
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.137-152, ⟨10.1007/978-3-319-24018-3_9⟩
Conference papers hal-01442558v1
Image document

Access Control and Query Verification for Untrusted Databases

Rohit Jain , Sunil Prabhakar
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.211-225, ⟨10.1007/978-3-642-39256-6_14⟩
Conference papers hal-01490706v1
Image document

Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon Region's eHealth Platform

Syed Naqvi , Gautier Dallons , Arnaud Michot , Christophe Ponsard
5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School(PRIMELIFE), Sep 2009, Nice, France. pp.146-159, ⟨10.1007/978-3-642-14282-6_12⟩
Conference papers hal-01061162v1
Image document

Towards an Automated Extraction of ABAC Constraints from Natural Language Policies

Manar Alohaly , Hassan Takabi , Eduardo Blanco
34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.105-119, ⟨10.1007/978-3-030-22312-0_8⟩
Conference papers hal-03744313v1
Image document

Enforcement of Privacy Requirements

Padmanabhan Krishnan , Kostyantyn Vorobyov
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.272-285, ⟨10.1007/978-3-642-39218-4_21⟩
Conference papers hal-01463860v1
Image document

Re-designing the Web’s Access Control System

Wenliang Du , Xi Tan , Tongbo Luo , Karthick Jayaraman , Zutao Zhu
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.4-11, ⟨10.1007/978-3-642-22348-8_2⟩
Conference papers hal-01586586v1
Image document

Securing bluetooth low energy locks from unauthorizedaccess and surveillance

Anthony Rose , Jason Bindewald , Benjamin Ramsey , Mason Rice , Barry Mullins
11th International Conference on Critical Infrastructure Protection (ICCIP), Mar 2017, Arlington, VA, United States. pp.319-338, ⟨10.1007/978-3-319-70395-4_16⟩
Conference papers hal-01819142v1
Image document

An ABAC Model with Trust and Gossiping (ABAC–TG) for Online Social Networks

Adi Swissa , Ehud Gudes
35th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2021, Calgary, AB, Canada. pp.377-392, ⟨10.1007/978-3-030-81242-3_22⟩
Conference papers hal-03677023v1
Image document

Role-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems

Antonios Gouglidis , Ioannis Mavridis
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.38-53, ⟨10.1007/978-3-642-21040-2_3⟩
Conference papers hal-01573308v1
Image document

A User-to-User Relationship-Based Access Control Model for Online Social Networks

Yuan Cheng , Jaehong Park , Ravi Sandhu
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.8-24, ⟨10.1007/978-3-642-31540-4_2⟩
Conference papers hal-01534764v1
Image document

A Model for Trust-Based Access Control and Delegation in Mobile Clouds

Indrajit Ray , Dieudonne Mulamba , Indrakshi Ray , Keesook J. Han
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.242-257, ⟨10.1007/978-3-642-39256-6_16⟩
Conference papers hal-01490708v1
Image document

Role Mining under Role-Usage Cardinality Constraint

John C. John , Shamik Sural , Vijayalakshmi Atluri , Jaideep S. Vaidya
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.150-161, ⟨10.1007/978-3-642-30436-1_13⟩
Conference papers hal-01518246v1
Image document

Secure Resource Sharing for Embedded Protected Module Architectures

Jo Van Bulck , Job Noorman , Jan Tobias Mühlberg , Frank Piessens
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.71-87, ⟨10.1007/978-3-319-24018-3_5⟩
Conference papers hal-01442554v1
Image document

Type Checking Privacy Policies in the π-calculus

Dimitrios Kouzapas , Anna Philippou
35th International Conference on Formal Techniques for Distributed Objects, Components, and Systems (FORTE), Jun 2015, Grenoble, France. pp.181-195, ⟨10.1007/978-3-319-19195-9_12⟩
Conference papers hal-01767337v1
Image document

A Framework for Threat Assessment in Access Control Systems

Hemanth Khambhammettu , Sofiene Boulares , Kamel Adi , Luigi Logrippo
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.187-198, ⟨10.1007/978-3-642-30436-1_16⟩
Conference papers hal-01518243v1
Image document

Visitor Access Control Scheme Utilizing Social Relationship in the Real World

Gen Kitagata , Debasish Chakraborty , Satoshi Ogawa , Atushi Takeda , Kazuo Hashimoto , et al.
4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.95-107, ⟨10.1007/978-3-642-13446-3_7⟩
Conference papers hal-01061321v1