Journal articles on the topic 'Data access control policies'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Data access control policies.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jain, Taniya. "Secure Big Data Access Control Policies for Cloud Computing Environment." International Journal of Innovative Research in Computer Science & Technology 5, no. 2 (March 31, 2017): 253–56. http://dx.doi.org/10.21276/ijircst.2017.5.2.8.
Full textBouganim, Luc, Francois Dang Ngoc, and Philippe Pucheral. "Dynamic access-control policies on XML encrypted data." ACM Transactions on Information and System Security 10, no. 4 (January 2008): 1–37. http://dx.doi.org/10.1145/1284680.1284684.
Full textBrewster, Christopher, Barry Nouwt, Stephan Raaijmakers, and Jack Verhoosel. "Ontology-based Access Control for FAIR Data." Data Intelligence 2, no. 1-2 (January 2020): 66–77. http://dx.doi.org/10.1162/dint_a_00029.
Full textAziz, Benjamin. "Towards open data-driven evaluation of access control policies." Computer Standards & Interfaces 56 (February 2018): 13–26. http://dx.doi.org/10.1016/j.csi.2017.09.001.
Full textYaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures." Information Resources Management Journal 30, no. 4 (October 2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.
Full textPervez, Zeeshan, Asad Masood Khattak, Sungyoung Lee, Young-Koo Lee, and Eui-Nam Huh. "Oblivious access control policies for cloud based data sharing systems." Computing 94, no. 12 (August 21, 2012): 915–38. http://dx.doi.org/10.1007/s00607-012-0206-z.
Full textVenkatesan, G., and K. Ambika. "Indexing Policies in Cloud Information Accountability for Data Sharing." Asian Journal of Computer Science and Technology 2, no. 1 (May 5, 2013): 22–27. http://dx.doi.org/10.51983/ajcst-2013.2.1.1712.
Full textLiu, Gang, Guofang Zhang, Quan Wang, Shaomin Ji, and Lizhi Zhang. "Fine-grained access control method for private data in android system." International Journal of Distributed Sensor Networks 15, no. 3 (March 2019): 155014771984023. http://dx.doi.org/10.1177/1550147719840232.
Full textSabitha, S., and M. S. Rajasree. "Access control based privacy preserving secure data sharing with hidden access policies in cloud." Journal of Systems Architecture 75 (April 2017): 50–58. http://dx.doi.org/10.1016/j.sysarc.2017.03.002.
Full textGuo, Jinyi, Wei Ren, Yi Ren, and Tianqin Zhu. "A Watermark-Based in-Situ Access Control Model for Image Big Data." Future Internet 10, no. 8 (July 29, 2018): 69. http://dx.doi.org/10.3390/fi10080069.
Full textArunajyothi, G. "Key based Access Control Policies to Solve Security in Cloud Data Sharing." International Journal of Emerging Research in Management and Technology 6, no. 12 (June 11, 2018): 45. http://dx.doi.org/10.23956/ijermt.v6i12.33.
Full textMuppavarapu, Vineela, and Soon M. Chung. "Semantic-Based Access Control for Data Resources in Open Grid Services Architecture." International Journal of Grid and High Performance Computing 6, no. 2 (April 2014): 1–23. http://dx.doi.org/10.4018/ijghpc.2014040101.
Full textMeneka, M., and K. Meenakshisundaram. "An Enhancement Role and Attribute Based Access Control Mechanism in Big Data." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 3187. http://dx.doi.org/10.11591/ijece.v8i5.pp3187-3193.
Full textLakaraju, Sandeep, Dianxiang Xu, and Yong Wang. "Analysis of Healthcare Workflows in Accordance with Access Control Policies." International Journal of Healthcare Information Systems and Informatics 11, no. 1 (January 2016): 1–20. http://dx.doi.org/10.4018/ijhisi.2016010101.
Full textKuts, D. V., and S. V. Porshnev. "THE FEATURES OF MANDATORY ACCESS CONTROL MODEL IN MODERN UNAUTHORIZED ACCESS DATA PROTECTION TOOLS." Journal of the Ural Federal District. Information security 20, no. 3 (2020): 27–33. http://dx.doi.org/10.14529/secur200303.
Full textLi, Jian, and William K. Cheung. "Access Control on Semantic Web Data Using Query Rewriting." International Journal of Organizational and Collective Intelligence 1, no. 2 (April 2010): 46–66. http://dx.doi.org/10.4018/joci.2010040103.
Full textShirsath, Rakesh, and Dr K. V. Daya Sagar. "A Review of fine grained access control techniques." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 20. http://dx.doi.org/10.14419/ijet.v7i2.7.10249.
Full textHuang, Jie, and Dehua Wu. "Access Control Model Scheme based on Policy Grading in Natural Language Processing Blockchain Environment." Mobile Information Systems 2022 (August 8, 2022): 1–9. http://dx.doi.org/10.1155/2022/4365944.
Full textTrojer, Thomas, Basel Katt, Ruth Breu, Thomas Schabetsberger, and Richard Mair. "Managing Privacy and Effectiveness of Patient-Administered Authorization Policies." International Journal of Computational Models and Algorithms in Medicine 3, no. 2 (April 2012): 43–62. http://dx.doi.org/10.4018/jcmam.2012040103.
Full textSeifermann, Stephan, Robert Heinrich, Dominik Werle, and Ralf Reussner. "Detecting violations of access control and information flow policies in data flow diagrams." Journal of Systems and Software 184 (February 2022): 111138. http://dx.doi.org/10.1016/j.jss.2021.111138.
Full textTang, Xiao Yong, Jin Wei Li, and Gui Ping Liao. "A Trust-Aware Access Control Policy for Cloud Data Protection." Applied Mechanics and Materials 411-414 (September 2013): 40–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.40.
Full textZhang, Jian, Jin Yao, and Kun Huang. "Research on Access Control Policy for Confidential Information System." Applied Mechanics and Materials 263-266 (December 2012): 3064–67. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3064.
Full textLi, Teng, Jiawei Zhang, Yanbo Yang, Wei Qiao, and Yangxu Lin. "Auditable and Times limitable Secure Data Access Control for Cloud-based Industrial Internet of Things." Journal of Networking and Network Applications 1, no. 3 (2021): 129–38. http://dx.doi.org/10.33969/j-nana.2021.010306.
Full textZheng, Kaifa, Caiyang Ding, and Jinchen Wang. "A Secure Data-Sharing Scheme for Privacy-Preserving Supporting Node–Edge–Cloud Collaborative Computation." Electronics 12, no. 12 (June 19, 2023): 2737. http://dx.doi.org/10.3390/electronics12122737.
Full textAlattab, Ahmed Abdu, Reyazur Rashid Irshad, Anwar Ali Yahya, and Amin A. Al-Awady. "Privacy Protected Preservation of Electric Vehicles’ Data in Cloud Computing Using Secure Data Access Control." Energies 15, no. 21 (October 31, 2022): 8085. http://dx.doi.org/10.3390/en15218085.
Full textEmad F. Khalaf, Emad F. Khalaf. "A Survey of Access Control and Data Encryption for Database Security." journal of King Abdulaziz University Engineering Sciences 28, no. 1 (January 4, 2017): 19–30. http://dx.doi.org/10.4197/eng.28-1.2.
Full textIyer, Padmavathi, and Amirreza Masoumzadeh. "Learning Relationship-Based Access Control Policies from Black-Box Systems." ACM Transactions on Privacy and Security 25, no. 3 (August 31, 2022): 1–36. http://dx.doi.org/10.1145/3517121.
Full textDemurjian, Steven A., Eugene Sanzi, Thomas P. Agresta, and William A. Yasnoff. "Multi-Level Security in Healthcare Using a Lattice-Based Access Control Model." International Journal of Privacy and Health Information Management 7, no. 1 (January 2019): 80–102. http://dx.doi.org/10.4018/ijphim.2019010105.
Full textLI, Xinlong. "A Blockchain-Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage." Computational Intelligence and Neuroscience 2022 (April 27, 2022): 1–12. http://dx.doi.org/10.1155/2022/2254411.
Full textTalha, Mohamed, and Anas Abou El Kalam. "Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms." JUCS - Journal of Universal Computer Science 27, no. 12 (December 28, 2021): 1300–1324. http://dx.doi.org/10.3897/jucs.77046.
Full textKomal, Unnati. "Data Leakage Detection using Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 3129–32. http://dx.doi.org/10.22214/ijraset.2023.52273.
Full textDai, Chang Ying, Wen Tao Gong, and Jing Liu. "Access Process of Data-Flow in Cross-Domain Usage Control Model Based on XACML." Advanced Materials Research 143-144 (October 2010): 1275–79. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1275.
Full textHaguouche, Samira, and Zahi Jarir. "Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism." Security and Communication Networks 2018 (October 21, 2018): 1–13. http://dx.doi.org/10.1155/2018/1572812.
Full textPatil, Suraj Krishna, Sandipkumar Chandrakant Sagare, and Alankar Shantaram Shelar. "Use of Purpose and Role Based Access Control Mechanisms to Protect Data Within RDBMS." International Journal of Software Innovation 8, no. 1 (January 2020): 82–91. http://dx.doi.org/10.4018/ijsi.2020010105.
Full textHuang, Yi, Xin Qiang Ma, Dan Ning Li, and Rong Wu. "Research and Applications of Access Control Based on Logic SQL Database System." Advanced Materials Research 143-144 (October 2010): 672–76. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.672.
Full textXiong, An Ping, and Xin Xin He. "Multiple Access Control Struction for Cloud with Ciphertext." Applied Mechanics and Materials 556-562 (May 2014): 5888–92. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5888.
Full textZhong, Ting, You Peng Sun, and Qiao Liu. "Fine-Grained Access Control with Efficient Revocation in Cloud Storage." Applied Mechanics and Materials 571-572 (June 2014): 79–89. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.79.
Full textTruong, Hien, José L. Hernández-Ramos, Juan A. Martinez, Jorge Bernal Bernabe, Wenting Li, Agustin Marin Frutos, and Antonio Skarmeta. "Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts." Security and Communication Networks 2022 (June 2, 2022): 1–14. http://dx.doi.org/10.1155/2022/1828747.
Full textPereira, Óscar Mortágua, Diogo Domingues Regateiro, and Rui L. Aguiar. "Secure, Dynamic and Distributed Access Control Stack for Database Applications." International Journal of Software Engineering and Knowledge Engineering 25, no. 09n10 (November 2015): 1703–8. http://dx.doi.org/10.1142/s0218194015710035.
Full textKaushik, Shweta, and Charu Gandhi. "Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud." International Journal of Information Security and Privacy 15, no. 2 (April 2021): 29–52. http://dx.doi.org/10.4018/ijisp.2021040102.
Full textShen, Xieyang, Chuanhe Huang, Danxin Wang, and Jiaoli Shi. "A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart Cities." Wireless Communications and Mobile Computing 2021 (October 8, 2021): 1–15. http://dx.doi.org/10.1155/2021/6686675.
Full textHelil, Nurmamat, and Kaysar Rahman. "CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/2713595.
Full textStojanov, Riste, Vladimir Zdraveski, and Dimitar Trajanov. "Challenges and Opportunities in Applying Semantics to Improve Access Control in the Field of Internet of Things." Electronics ETF 21, no. 2 (August 8, 2018): 66. http://dx.doi.org/10.7251/els1721066s.
Full textZhang, Duo, Shangping Wang, Yinglong Zhang, Qian Zhang, and Yaling Zhang. "A Secure and Privacy-Preserving Medical Data Sharing via Consortium Blockchain." Security and Communication Networks 2022 (May 18, 2022): 1–15. http://dx.doi.org/10.1155/2022/2759787.
Full textIbraimi, Luan, Qiang Tang, Pieter Hartel, and Willem Jonker. "Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records." International Journal of Computational Models and Algorithms in Medicine 1, no. 2 (April 2010): 1–21. http://dx.doi.org/10.4018/jcmam.2010040101.
Full textSzabó, Zoltán, and Vilmos Bilicki. "Access Control of EHR Records in a Heterogeneous Cloud Infrastructure." Acta Cybernetica 25, no. 2 (December 7, 2021): 485–516. http://dx.doi.org/10.14232/actacyb.290283.
Full textКраснов, С. А., А. А. Нечай, and О. Н. Бамбурова. "An approach to declining access in information systems based on intellectual data analysis." Vestnik of Russian New University. Series «Complex systems: models, analysis, management», no. 4 (January 10, 2022): 95–105. http://dx.doi.org/10.18137/rnu.v9187.21.04.p.095.
Full textNagasubramanian, Gayathri, Rakesh kumar Sakthivel, and Fadi Al-Turjman. "Secure and Consistent Job Administration Using Encrypted Data Access Policies in Cloud Systems." Computers & Electrical Engineering 96 (December 2021): 107520. http://dx.doi.org/10.1016/j.compeleceng.2021.107520.
Full textLiu, Xueyan, Yukun Luo, and Xiaotao Yang. "Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks." Mobile Information Systems 2020 (August 3, 2020): 1–12. http://dx.doi.org/10.1155/2020/3984048.
Full textLiu, Meiping, Cheng Yang, Hao Li, and Yana Zhang. "An Efficient Attribute-Based Access Control (ABAC) Policy Retrieval Method Based on Attribute and Value Levels in Multimedia Networks." Sensors 20, no. 6 (March 20, 2020): 1741. http://dx.doi.org/10.3390/s20061741.
Full text