2022
DOI: 10.1016/j.jisa.2022.103301
|View full text |Cite
|
Sign up to set email alerts
|

Optimization of Access Control Policies

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 91 publications
0
3
0
Order By: Relevance
“…This condition occurs when the user should have permissions in the form of a permit, but the evaluation output produces a value in the form of denial, and vice versa. From the aspect of computer security, in the opinion of [21], [30], attacks against the system occur because of inconsistencies in the implementation of access control.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…This condition occurs when the user should have permissions in the form of a permit, but the evaluation output produces a value in the form of denial, and vice versa. From the aspect of computer security, in the opinion of [21], [30], attacks against the system occur because of inconsistencies in the implementation of access control.…”
Section: Resultsmentioning
confidence: 99%
“…Access control is a mechanism to limit the operation or action of a computer system to only legitimate users [21]. Meanwhile, access control has four main issues: identification, authentication, authorization, and access decisions.…”
Section: Methodsmentioning
confidence: 99%
“…Again, it is very important that a medical report containing sensitive data about a user can not be accessible by other users. Effective ways to achieve confidentiality are encryption [161], access control mechanisms [162], or a combination of both [163]. • Integrity.…”
Section: ) Security Propertiesmentioning
confidence: 99%