Access control offers mechanisms to control and limit the actions or operations that are performed by a user on a set of resources in a system. Many access control models exist that are able to support this basic requirement. One of the properties examined in the context of these models is their ability to successfully restrict access to resources. Nevertheless, considering only restriction of access may not be enough in some environments, as in critical infrastructures. The protection of systems in this type of environment requires a new line of enquiry. It is essential to ensure that appropriate access is always possible, even when users and resources are subjected to challenges of various sorts. Resilience in access control is conceived ...
Abstract. If an access control policy promises that a resource is protected in a system, how do we k...
Any model of access control has two fundamental aims: to ensure that resources are protected from in...
Access control system is an important component to protect patients’ information from abuse in a hea...
Cyber-physical systems (CPS) are characterised by interactions of physical and computational compone...
We introduce the notion of resiliency policies in the context of access control systems. Such polici...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
We introduce the notion of resiliency policies in the context of access control systems. Such polici...
AbstractAn access control system regulates the rights of users to gain access to resources in accord...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
Sharing of information is fundamental to modern computing environments across many application domai...
Attribute-based access control (ABAC) is a new generation of access control techniques. It enables f...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
With reference to a protection system featuring active subjects that attempt to access passive, type...
Access control systems are widely used means for the protection of computing systems. They are defin...
Increasing the use of Internet-based devices offers novel opportunities for users to access and shar...
Abstract. If an access control policy promises that a resource is protected in a system, how do we k...
Any model of access control has two fundamental aims: to ensure that resources are protected from in...
Access control system is an important component to protect patients’ information from abuse in a hea...
Cyber-physical systems (CPS) are characterised by interactions of physical and computational compone...
We introduce the notion of resiliency policies in the context of access control systems. Such polici...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
We introduce the notion of resiliency policies in the context of access control systems. Such polici...
AbstractAn access control system regulates the rights of users to gain access to resources in accord...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
Sharing of information is fundamental to modern computing environments across many application domai...
Attribute-based access control (ABAC) is a new generation of access control techniques. It enables f...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
With reference to a protection system featuring active subjects that attempt to access passive, type...
Access control systems are widely used means for the protection of computing systems. They are defin...
Increasing the use of Internet-based devices offers novel opportunities for users to access and shar...
Abstract. If an access control policy promises that a resource is protected in a system, how do we k...
Any model of access control has two fundamental aims: to ensure that resources are protected from in...
Access control system is an important component to protect patients’ information from abuse in a hea...