2020 10th Annual Computing and Communication Workshop and Conference (CCWC) 2020
DOI: 10.1109/ccwc47524.2020.9031179
|View full text |Cite
|
Sign up to set email alerts
|

Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…The foundational models of access control mechanisms are the Discretionary Access Control (DAC) and Mandatory Access Control (MAC) [8]. DAC, characterized by its flexibility, allows the resource owner to determine who has access to it (like a homeowner who decides which guests can enter their home) [18]. However, its reliance on individual users to set their access controls introduces significant risk, particularly with insider threats, as it enables users with malicious intent to grant access to sensitive information improperly [3].…”
Section: Evolution Of Access Control Mechanisms and Role-based Access...mentioning
confidence: 99%
“…The foundational models of access control mechanisms are the Discretionary Access Control (DAC) and Mandatory Access Control (MAC) [8]. DAC, characterized by its flexibility, allows the resource owner to determine who has access to it (like a homeowner who decides which guests can enter their home) [18]. However, its reliance on individual users to set their access controls introduces significant risk, particularly with insider threats, as it enables users with malicious intent to grant access to sensitive information improperly [3].…”
Section: Evolution Of Access Control Mechanisms and Role-based Access...mentioning
confidence: 99%
“…Discretionary Access Control (DAC): DAC is one of the primary access control techniques introduced in computing. It grants access by managing an access control matrix or an Access-Control List (ACL) [ 53 ]. Once access is granted in DAC, it remains forever until the administrator revokes access.…”
Section: Access Control Models In Iotmentioning
confidence: 99%
“…We adopt the ITU-T X.812 framework and the ABAC access control model [16] due to its fine-grained access control (needed for protecting FHIR resources, see next Section) versus other models, such as RBAC or DAC [17]. SoC explicit consents are translated to access control policies in XACML format.…”
Section: B Access Control Services In Healthcare Soamentioning
confidence: 99%