Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2017
ESSAC: Enhanced Scalable Secure Access Control Framework for Cloud Storage
ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed SystemsArticle No.: 24, Pages 1–8https://doi.org/10.1145/3102304.3102328Outsourcing data storage and IT workloads to a third-party cloud provider introduces some security risks and time performance degradation. Moreover, controlling access to this data becomes very difficult when the volume of the data and number of users ...
- ArticleApril 2016
Idea: Supporting Policy-Based Access Control on Database Systems
ESSoS 2016: Proceedings of the 8th International Symposium on Engineering Secure Software and Systems - Volume 9639Pages 251–259https://doi.org/10.1007/978-3-319-30806-7_16Applications are increasingly operating on large data sets. This trend creates problems for access control, which in principle restricts the actions that subjects can perform on any item in that data set. Performance issues therefore emerge, typically ...
- ArticleAugust 2015
WSACd - A Usable Access Control Framework for Smart Home Devices
- Konstantinos Fysarakis,
- Charalampos Konstantourakis,
- Konstantinos Rantos,
- Charalampos Manifavas,
- Ioannis Papaefstathiou
AbstractComputing devices already permeate working and living environments; a trend which is expected to intensify in the coming years. However, the direct interaction smart devices often have with the physical world, along with the processing, storage ...
- ArticleAugust 2015
Secure and Authenticated Access to LLN Resources Through Policy Constraints
AbstractUbiquitous devices comprising several resource-constrained sensors and actuators while having the long desired Internet connectivity, are becoming part of many solutions that seek to enhance user’s environment smartness and quality of living. ...
- ArticleAugust 2015
RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems
Proceedings of the Third International Conference on Human Aspects of Information Security, Privacy, and Trust - Volume 9190Pages 619–630https://doi.org/10.1007/978-3-319-20376-8_55The need to manage embedded systems, brought forward by the wider adoption of pervasive computing, is particularly vital in the context of secure and safety-critical applications. This work presents RT-SPDM, a framework for the real-time management of ...
- articleMay 2008
Dynamic security context management in Grid-based applications
Future Generation Computer Systems (FGCS), Volume 24, Issue 5Pages 434–441https://doi.org/10.1016/j.future.2007.07.015This paper summarises ongoing research and recent results on the development of flexible access control infrastructure for complex resource provisioning in Grid-based collaborative applications and on-demand network services provisioning. The paper ...
- ArticleMay 2006
Policy Based Access Control in Dynamic Grid-based Collaborative Environment
CTS '06: Proceedings of the International Symposium on Collaborative Technologies and SystemsPages 64–73https://doi.org/10.1109/CTS.2006.59This paper describes the design and development of a flexible, customer-driven, security infrastructure for Gridbased Collaborative Environments. The paper proposes further development of the access control model built around a service or resource ...