Zobrazeno 1 - 10
of 59
pro vyhledávání: '"Sylvia L. Osborn"'
Publikováno v:
Encyclopedia of Complexity and Systems Science ISBN: 9783642277375
Encyclopedia of Complexity and Systems Science Series ISBN: 9781071626276
Encyclopedia of Complexity and Systems Science Series ISBN: 9781071626276
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4b3da2cc12ad964d8dfe8ba69081786b
https://doi.org/10.1007/978-3-642-27737-5_752-1
https://doi.org/10.1007/978-3-642-27737-5_752-1
Autor:
Sylvia L. Osborn, Daniel Servos
Publikováno v:
ACM Computing Surveys. 49:1-45
Attribute-based access control (ABAC) is a promising alternative to traditional models of access control (i.e., discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC)) that is drawing attention in bot
Autor:
Sylvia L. Osborn
With the widespread use of online systems, there is an increasing focus on maintaining the privacy of individuals and information about them. This is often referred to as a need for privacy protection. The author briefly examines definitions of priva
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8887adad4d4bff49499760642ee4fdaa
https://doi.org/10.4018/978-1-5225-8897-9.ch053
https://doi.org/10.4018/978-1-5225-8897-9.ch053
Autor:
Sylvia L. Osborn, Daniel Servos
Publikováno v:
Proceedings of the Third ACM Workshop on Attribute-Based Access Control.
Attribute-Based Access Control (ABAC), a promising alternative to traditional models of access control, has gained significant attention in recent academic literature. This attention has lead to the creation of a number of ABAC models including our p
Autor:
Sylvia L. Osborn, Daniel Servos
Publikováno v:
Foundations and Practice of Security ISBN: 9783319519654
FPS
FPS
Attribute-Based Access Control (ABAC) is an emerging model of access control that has gained significant interest in both recent academic literature and industry application. However, to date there have been almost no attempts to incorporate the conc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1c06e50bd38cd7c99e83dd06844926ea
https://doi.org/10.1007/978-3-319-51966-1_21
https://doi.org/10.1007/978-3-319-51966-1_21
Autor:
Hessam Zakerzadeh, Sylvia L. Osborn
Publikováno v:
International Journal of Information Security. 12:423-437
Streaming data are widely used in today's world. Data come from different sources in streams and must be processed online and with minimum delay. These data stream can contain confidential data such as customers' purchase information and need to be m
Autor:
Sylvia L. Osborn, He Wang
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering. 23:1569-1582
Delegation in access control is used to deal with exceptional circumstances, when a regular user is unable to perform their normal job and delegates all or part of it to others. These situations can be anticipated and built into the security design a
Autor:
Sylvia L. Osborn, Daniel Servos
Publikováno v:
Foundations and Practice of Security ISBN: 9783319170398
FPS
FPS
Attribute-based access control (ABAC) is a promising alternative to traditional models of access control (i.e. discretionary access control (DAC), mandatory access control (MAC) and role-based access control (RBAC)) that is drawing attention in both
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::386b9df51e2c6b98083821a36a1da547
https://doi.org/10.1007/978-3-319-17040-4_12
https://doi.org/10.1007/978-3-319-17040-4_12
Autor:
Sylvia L. Osborn
Publikováno v:
Data & Knowledge Engineering. 43:317-333
Role-based access control provides a very flexible set of mechanisms for managing the access control of a complex system with many users, objects and applications. The role graph model of Nyanchama and Osborn is one example of how role administration
Autor:
Sylvia L. Osborn, Sharmin Ahmed
Publikováno v:
SACMAT
This paper demonstrates a proof-of-concept prototype that is able to automatically and effectively detect and report different types of risk factors during the process of role mining. A role mining platform is embedded within the tool so that differe