2022
DOI: 10.1109/tcc.2019.2927341
|View full text |Cite
|
Sign up to set email alerts
|

Context-Aware Policy Enforcement for PaaS-Enabled Access Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…We first introduced the need for context handlers capable of processing raw contextual data and inferring knowledge which is useful for access control as part of our previous work [9] in the cloud platform-as-a-service security domain. Specifically, we have developed con-text handlers that are able: i) to provide real-time measurements with respect to certain contextual attributes and ii) to uplift the registered attribute value(s) to a semantic level that is appropriate for the application domain and the access control policy at hand.…”
Section: Attribute-based Access Controlmentioning
confidence: 99%
“…We first introduced the need for context handlers capable of processing raw contextual data and inferring knowledge which is useful for access control as part of our previous work [9] in the cloud platform-as-a-service security domain. Specifically, we have developed con-text handlers that are able: i) to provide real-time measurements with respect to certain contextual attributes and ii) to uplift the registered attribute value(s) to a semantic level that is appropriate for the application domain and the access control policy at hand.…”
Section: Attribute-based Access Controlmentioning
confidence: 99%
“…Pham and Yeo et al in [19] designed a context-aware trust management scheme and proposed a secure and flexible framework to manage trust and privacy; however, the protocol was complex and the practicability was low. Verginadis and Patiniotakis et al [20] proposed a new overall access control framework, supported the combination of effective context-aware access control strategies; however; the evaluation of access control rules was complex. In [21], the learning algorithm can converge to equilibrium, each user can achieve a balance between accuracy and privacy, but the game equilibrium research lacked the incentive mechanism.…”
Section: B Privacy and Multiple Factorsmentioning
confidence: 99%
“…The i s is greater, the risk is greater. According to formulas (19) and (20), risk and service have an inverse proportional relationship [6]. and "maximum dispersion degree"…”
Section: ) Trust Riskmentioning
confidence: 99%
See 1 more Smart Citation
“…In many cases, parts of the data remain unreachable, even in emergencies, because they are located in information systems outside the treating organisation's boundaries. This limitation could be addressed by using shared medical record systems that exploit cloud solutions [5]- [7] or distributed database systems, such as the InterPlanetary File System (IPFS) [8]. These shared systems promise to provide the required data consistency and availability for healthcare purposes.…”
Section: Introductionmentioning
confidence: 99%