Nowadays the majority of users are unable toproperly configure security mechanisms mostly because theyare not usable for them. To reach the goal of having usable security mechanisms, the best solution is to minimize the amount of user interactions and simplify configuration tasks. Automation is a proper solution for minimizing the amount of user interaction. Fully automated security systems are possible for most security objectives, with the exception ofthe access control policy generation. Fully automated accesscontrol policy generation is currently not possible because individual preferences must be taken into account and, thus, requires user interaction. To address this problem we proposea mechanism that assists users to generate proper ...
In open computing systems, resources are shared across organizational boundaries in an effort to all...
Attribute-based access control (ABAC) is a new generation of access control techniques. It enables f...
Data sharing is becoming increasingly important as organizations seek to improve their operations an...
Nowadays the majority of users are unable toproperly configure security mechanisms mostly because th...
Nowadays the majority of users are unable to properly configure security mechanisms mostly because t...
Abstract—Nowadays the majority of users are unable to properly configure security mechanisms mostly ...
This paper tackles the problem of usability and security in access control mechanisms. A theoretical...
This paper tackles the problem of usability and security in access control mechanisms. A theoretical...
Access control policies describe high level requirements for access control systems. Access control ...
The research described in this work can significantly simplify and facilitate the creation and confi...
The paper presents an approach based on machine learning to refine attribute-based access control p...
The flexibility, scalability, dynamic nature, portability and identity-less features of Attribute Ba...
Sharing of information is fundamental to modern computing environments across many application domai...
Abstract—Attribute-based access control (ABAC) provides a high level of flexibility that promotes se...
2021 Summer.Includes bibliographical references.Attribute-Based Access Control (ABAC) is a methodolo...
In open computing systems, resources are shared across organizational boundaries in an effort to all...
Attribute-based access control (ABAC) is a new generation of access control techniques. It enables f...
Data sharing is becoming increasingly important as organizations seek to improve their operations an...
Nowadays the majority of users are unable toproperly configure security mechanisms mostly because th...
Nowadays the majority of users are unable to properly configure security mechanisms mostly because t...
Abstract—Nowadays the majority of users are unable to properly configure security mechanisms mostly ...
This paper tackles the problem of usability and security in access control mechanisms. A theoretical...
This paper tackles the problem of usability and security in access control mechanisms. A theoretical...
Access control policies describe high level requirements for access control systems. Access control ...
The research described in this work can significantly simplify and facilitate the creation and confi...
The paper presents an approach based on machine learning to refine attribute-based access control p...
The flexibility, scalability, dynamic nature, portability and identity-less features of Attribute Ba...
Sharing of information is fundamental to modern computing environments across many application domai...
Abstract—Attribute-based access control (ABAC) provides a high level of flexibility that promotes se...
2021 Summer.Includes bibliographical references.Attribute-Based Access Control (ABAC) is a methodolo...
In open computing systems, resources are shared across organizational boundaries in an effort to all...
Attribute-based access control (ABAC) is a new generation of access control techniques. It enables f...
Data sharing is becoming increasingly important as organizations seek to improve their operations an...