2015 IEEE Conference on Collaboration and Internet Computing (CIC) 2015
DOI: 10.1109/cic.2015.18
|View full text |Cite
|
Sign up to set email alerts
|

CARDS - Collaborative Audit and Report Data Sharing for A-Posteriori Access Control in DOSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Moreover, non contextual security rules were modeled, and techniques to extract necessary data from logs for policy violation detection were proposed. Other applications of the a posteriori access control can be also related to business processes [4], and detecting violation of privacy protection rules in social networks [9].…”
Section: State Of the Artmentioning
confidence: 99%
“…Moreover, non contextual security rules were modeled, and techniques to extract necessary data from logs for policy violation detection were proposed. Other applications of the a posteriori access control can be also related to business processes [4], and detecting violation of privacy protection rules in social networks [9].…”
Section: State Of the Artmentioning
confidence: 99%
“…These models enable the collaborative specification of policies aiming at the protection of resources co-owned by multiple users [Bahri et al 2015;Carminati and Ferrari 2011;Ilia et al 2017;Mehregan and Fong 2016;Rajtmajer et al 2016;Squicciarini et al 2010;Wishart et al 2010;Xiao and Tan 2012;Vishwamitra et al 2017]. Data governance models based on multi-ownership implicitly assume that all entities related to a data object have the same level of authority over the object.…”
Section: Governancementioning
confidence: 99%