The sharing of data is becoming increasingly important for the process and manufacturing industries that are using data-driven models and advanced analysis to assess production performance and make predictions, e.g., on wear and tear. In such environments, access to data needs to be accurately controlled to prevent leakage to unauthorized users while providing easy to manage policies. Data should further be shared with users outside trusted domains using encryption. Finally, means for revoking access to data are needed. This paper provides a survey on attribute-based approaches for access control to data, focusing on policy management and enforcement. We aim to identify key properties provided by attribute-based access control (ABAC) and at...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating t...
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional ...
In the Industry 4.0 era, secure and efficient data sharing is vital for innovation and operational e...
The Industry 4.0 revolution relies heavily on data to generate value, innovation, new services, and ...
The Industry 4.0 revolution relies heavily on data to generate value, innovation, new services, and ...
The Industry 4.0 revolution relies heavily on data to generate value, innovation, new services, and ...
Attribute-based encryption (ABE) is widely used for a secure and efficient data sharing. The predete...
Abstract—Attribute-based access control (ABAC) has been regarded in recent years as an effective way...
International audienceIn several distributed systems a user should only be able to access data if a ...
With the recent growth of networking, peoples can share their data with others through online, by us...
In several distributed systems a user should only be able to access data if a user posses a certain ...
Sharing of information is fundamental to modern computing environments across many application domai...
In this thesis we examine several aspects of data-centric security. In particular, we take a look at...
In this thesis we examine several aspects of data-centric security. In particular, we take a look at...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating t...
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional ...
In the Industry 4.0 era, secure and efficient data sharing is vital for innovation and operational e...
The Industry 4.0 revolution relies heavily on data to generate value, innovation, new services, and ...
The Industry 4.0 revolution relies heavily on data to generate value, innovation, new services, and ...
The Industry 4.0 revolution relies heavily on data to generate value, innovation, new services, and ...
Attribute-based encryption (ABE) is widely used for a secure and efficient data sharing. The predete...
Abstract—Attribute-based access control (ABAC) has been regarded in recent years as an effective way...
International audienceIn several distributed systems a user should only be able to access data if a ...
With the recent growth of networking, peoples can share their data with others through online, by us...
In several distributed systems a user should only be able to access data if a user posses a certain ...
Sharing of information is fundamental to modern computing environments across many application domai...
In this thesis we examine several aspects of data-centric security. In particular, we take a look at...
In this thesis we examine several aspects of data-centric security. In particular, we take a look at...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating t...
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional ...