Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Automatically Reducing Privilege for Access Control Policies
Proceedings of the ACM on Programming Languages (PACMPL), Volume 8, Issue OOPSLA2Article No.: 298, Pages 763–790https://doi.org/10.1145/3689738Access control policies are programs used to secure cloud resources. These polices should only grant the necessary permissions that a given application needs. However, it is challenging to write and maintain policies as applications and their required ...
- review-articleSeptember 2024
Identity management for Internet of Things: Concepts, challenges and opportunities
Computer Communications (COMS), Volume 224, Issue CPages 72–94https://doi.org/10.1016/j.comcom.2024.05.014AbstractThe number of connected devices is growing exponentially, fueling the rise of diverse new Internet of Things (IoT) applications. While the benefits of IoT for society are undeniable, the lack of a proper Identity Management (IdM) system for IoT ...
- ArticleJune 2024
AuthApp – Portable, Reusable Solid App for GDPR-Compliant Access Granting
- Andreas Both,
- Thorsten Kastner,
- Dustin Yeboah,
- Christoph Braun,
- Daniel Schraudner,
- Sebastian Schmid,
- Tobias Käfer,
- Andreas Harth
AbstractThe Solid (Social Linked Data) technology family was developed to provide the foundation for Data Sovereignty in the context of web applications. The advantage of this innovative approach is the opportunity to dynamically bind an identity to a ...
- research-articleAugust 2024
Using private set intersection to achieve privacy-preserving authorization for IoT systems
Journal of Information Security and Applications (JISA), Volume 83, Issue Chttps://doi.org/10.1016/j.jisa.2024.103759AbstractWe propose a novel approach to utilize private set intersection (PSI) to achieve privacy-preserving authorization for IoT systems for the first time in this work. Our contribution includes an optimized PSI protocol that reduces communication ...
- research-articleJuly 2024
Self-operation or Authorization? Decision structure of crowdfunding supply chains with IP derivative products
Electronic Commerce Research and Applications (ECRA), Volume 65, Issue Chttps://doi.org/10.1016/j.elerap.2024.101396Highlights- Reward-based crowdfunding is an innovative mechanism to finance IP derivative products.
- Self-operation and authorization are typical structures of IP crowdfunding supply chains.
- Optimal strategy of decision structure with constant ...
Reward-based crowdfunding has become a widely adopted financing mechanism in the creative economy, particularly for IP derivative products, resulting in a typical crowdfunding supply chain comprising an IP owner, a crowdfunding platform, and a ...
-
- review-articleJuly 2024
Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review
- Zinniya Taffannum Pritee,
- Mehedi Hasan Anik,
- Saida Binta Alam,
- Jamin Rahman Jim,
- Md Mohsin Kabir,
- M.F. Mridha
AbstractIn the continuously developing field of cyber security, user authentication and authorization play a vital role in protecting personal information and digital assets from unauthorized use. As the field of cyber security expands, traditional user ...
Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization
- Joseph W. Cutler,
- Craig Disselkoen,
- Aaron Eline,
- Shaobo He,
- Kyle Headley,
- Michael Hicks,
- Kesha Hietala,
- Eleftherios Ioannidis,
- John Kastner,
- Anwar Mamat,
- Darin McAdams,
- Matt McCutchen,
- Neha Rungta,
- Emina Torlak,
- Andrew M. Wells
Proceedings of the ACM on Programming Languages (PACMPL), Volume 8, Issue OOPSLA1Article No.: 118, Pages 670–697https://doi.org/10.1145/3649835Cedar is a new authorization policy language designed to be ergonomic, fast, safe, and analyzable. Rather than embed authorization logic in an application’s code, developers can write that logic as Cedar policies and delegate access decisions to Cedar’s ...
- review-articleMay 2024
Machine learning in identity and access management systems: Survey and deep dive
AbstractThe evolution of identity and access management (IAM) has been driven by the expansion of online services, cloud computing, and the Internet of Things (IoT). The proliferation of remote work, mobile applications, and interconnected devices has ...
- research-articleFebruary 2024
Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 13, Issue 1https://doi.org/10.1186/s13677-024-00606-yAbstractCloud computing is a new paradigm in this new cyber era. Nowadays, most organizations are showing more reliability in this environment. The increasing reliability of the Cloud also makes it vulnerable. As vulnerability increases, there will be a ...
- research-articleApril 2024
FedAAA-SDN: Federated Authentication, Authorization and Accounting in SDN controllers
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 239, Issue Chttps://doi.org/10.1016/j.comnet.2023.110130AbstractModern technology advancements such as Software Defined Networking (SDN) have been employed in distinct scenarios such as cloud computing and wireless networks, and have made network administration simpler since it gives greater flexibility in ...
- research-articleJuly 2024
Blockchain Solutions for Authorization and Authentication
Procedia Computer Science (PROCS), Volume 237, Issue CPages 115–122https://doi.org/10.1016/j.procs.2024.05.086AbstractRecently, most people have been looking for smart services that allow them to do their daily services directly without having to visit local businesses and providers [1]. As observed in recent times, citizens can now apply to open their own ...
- research-articleApril 2024
Analysis of the Impact of Billing, Authorizations and Unknown Debts on the Technical Reserve of Health Promotion Companies: Case of HPC in Colombia
Procedia Computer Science (PROCS), Volume 231, Issue CPages 607–614https://doi.org/10.1016/j.procs.2023.12.177AbstractThe management of the technical reserve in Empresas Promotoras de Salud (EPS) in Colombia demonstrates adequate financial capacity to ensure the effective delivery of healthcare services. Nevertheless, the reserve's inherent nature and the ...
- ArticleJanuary 2024
A Survey on Security in Data Transmission in IoT: Layered Architecture
AbstractThe Internet of Things (IoT) is the communications technology where, physical objects, which are basically not designed for connection, will be able to connect, create, receive and exchange collected data permanently and transparently. Many IoT ...
- research-articleJanuary 2024
A formal approach for the identification of redundant authorization policies in Kubernetes
AbstractApplication containerization allows for efficient resource utilization and improved performance when compared to traditional virtualization techniques. However, managing multiple containers and providing services such as load balancing and fault ...
- articleDecember 2023
Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques
International Journal of Cloud Applications and Computing (IJCAC-IGI), Volume 14, Issue 1Pages 1–30https://doi.org/10.4018/IJCAC.334364The advent of the metaverse has revolutionized virtual interactions and navigation, introducing intricate access control challenges. This paper addresses the need for effective access control models in the cloud-based metaverse. It explores its distinct ...
- research-articleNovember 2023
AccessChain: An access control framework to protect data access in blockchain enabled supply chain
Future Generation Computer Systems (FGCS), Volume 148, Issue CPages 380–394https://doi.org/10.1016/j.future.2023.06.009AbstractIn recent years, supply chains have evolved into huge ecosystems, demanding trust, provenance, and data privacy. Since blockchain technology (BCT) allows for the development of a distributed environment, it is ideal for supply chain management (...
Highlights- A multi-blockchain data privacy-preserving framework with fine-grained access control.
- Two separate ledgers to store business operations and contracts to maximize scalability.
- The architecture guarantees an efficient, scalable and ...
- ArticleOctober 2023
- review-articleApril 2023
Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions
Computer Communications (COMS), Volume 203, Issue CPages 199–225https://doi.org/10.1016/j.comcom.2023.02.023AbstractIn recent years, Decentralized Online Social Networks (DOSNs) have been attracting the attention of many users because they reduce the risk of censorship, surveillance, and information leakage from the service provider. In contrast to the most ...
- research-articleApril 2023
Cooperation or competition? The remanufacturing strategy with quality uncertainty in construction machinery industry
Computers and Industrial Engineering (CINE), Volume 178, Issue Chttps://doi.org/10.1016/j.cie.2023.109106Highlights- Quality uncertainty of used products is considered in remanufacturing.
- ...
Construction machinery remanufacturing is energy-consuming and susceptible to quality uncertainty of used products, which increases the variability of cost and carbon emission and affects the production decisions of the original ...
- research-articleMarch 2023
DAuth—Delegated Authorization Framework for Secured Serverless Cloud Computing
Wireless Personal Communications: An International Journal (WPCO), Volume 129, Issue 3Pages 1563–1583https://doi.org/10.1007/s11277-023-10189-7AbstractServerless computing which is known as Function as a service becomes a new form of cloud computing. In recent days it enables the components of cloud applications to run on multiple servers in order to provide various functionalities. However, the ...