2023
DOI: 10.1109/access.2023.3240000
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-Based Approaches for Secure Data Sharing in Industrial Contexts

Abstract: The sharing of data is becoming increasingly important for the process and manufacturing industries that are using data-driven models and advanced analysis to assess production performance and make predictions, e.g., on wear and tear. In such environments, access to data needs to be accurately controlled to prevent leakage to unauthorized users while providing easy to manage policies. Data should further be shared with users outside trusted domains using encryption. Finally, means for revoking access to data a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 38 publications
0
6
0
Order By: Relevance
“…While Role-Based Access Control (RBAC) is acclaimed for its strategic approach to minimizing insider threats, its implementation and operationalization present challenges and limitations [32]. These obstacles affect the efficiency and effectiveness of RBAC systems and highlight the nuanced complexity of mitigating insider threats within diverse organizational landscapes [33].…”
Section: Challenges and Limitations Of Rbac In Insider Threat Mitigationmentioning
confidence: 99%
“…While Role-Based Access Control (RBAC) is acclaimed for its strategic approach to minimizing insider threats, its implementation and operationalization present challenges and limitations [32]. These obstacles affect the efficiency and effectiveness of RBAC systems and highlight the nuanced complexity of mitigating insider threats within diverse organizational landscapes [33].…”
Section: Challenges and Limitations Of Rbac In Insider Threat Mitigationmentioning
confidence: 99%
“…Finally, Chiquito et al in [34] survey attribute-based approaches for access control to data, focusing on policy management and enforcement. The paper aims at identifying the key properties provided by ABAC and ABE that can be used to control data access to prevent leakage to unauthorized users while providing easy-to-manage policies.…”
Section: Related Work a Security Services For Cloud Systemsmentioning
confidence: 99%
“…These attributes serve as design properties that should be considered in the design and development of decentralized auctioning systems to ensure trust. Further information on several of these attributes can be found in previous work [24]. The main quality attributes we focus on are as follows:…”
Section: A Quality Attributes For Electronic Auctionsmentioning
confidence: 99%
“…However, in regard to open-cry (iterative) auction systems, the SotA is relatively limited in terms of research papers [15]- [17]. In a previous survey work, we analyzed decentralized auctions as a whole and concluded blockchain systems to be a promising implementation choice [18]. For this reason, we selected blockchain as the core of this paper.…”
Section: Introductionmentioning
confidence: 99%