Sciweavers

SACMAT
2015
ACM
8 years 8 months ago
Preventing Information Inference in Access Control
Technological innovations like social networks, personal devices and cloud computing, allow users to share and store online a huge amount of personal data. Sharing personal data o...
Federica Paci, Nicola Zannone
SACMAT
2015
ACM
8 years 8 months ago
Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling
A major concern in the adoption of cloud infrastructure-asa-service (IaaS) arises from multi-tenancy, where multiple tenants share the underlying physical infrastructure operated ...
Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu
SACMAT
2015
ACM
8 years 8 months ago
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval
Attribute Based Access Control (ABAC) is becoming the reference model for the specification and evaluation of access control policies. In ABAC policies and access requests are de...
Jason Crampton, Charles Morisset, Nicola Zannone
SACMAT
2015
ACM
8 years 8 months ago
Towards Attribute-Based Authorisation for Bidirectional Programming
Bidirectional programming allows developers to write programs that will produce transformations that extract data from a source document into a view. The same transformations can ...
Lionel Montrieux, Zhenjiang Hu
SACMAT
2015
ACM
8 years 8 months ago
Federated Access Management for Collaborative Network Environments: Framework and Case Study
With the advent of various collaborative sharing mechanisms such as Grids, P2P and Clouds, organizations including private and public sectors have recognized the benefits of bein...
Carlos E. Rubio-Medrano, Ziming Zhao, Adam Doup&ea...
SACMAT
2015
ACM
8 years 8 months ago
A Logical Approach to Restricting Access in Online Social Networks
Nowadays in popular online social networks users can blacklist some of their friends in order to disallow them to access resources that other non-blacklisted friends may access. W...
Marcos Cramer, Jun Pang, Yang Zhang
SACMAT
2015
ACM
8 years 8 months ago
Relationship-Based Access Control for an Open-Source Medical Records System
Inspired by the access control models of social network systems, Relationship-Based Access Control (ReBAC) was recently proposed as a general-purpose access control paradigm for a...
Syed Zain R. Rizvi, Philip W. L. Fong, Jason Cramp...
SACMAT
2015
ACM
8 years 8 months ago
Commune: Shared Ownership in an Agnostic Cloud
Cloud storage platforms promise a convenient way for users to share files and engage in collaborations, yet they require all files to have a single owner who unilaterally makes ...
Claudio Soriente, Ghassan O. Karame, Hubert Ritzdo...