Role performance trust-based access control for protecting sensitive attributes
Preserving privacy is a challenge and requires the management of access control, which may be based on role, purpose or trust. There are many recent advances of access control models have been developed to avoid unauthorized users access to the privacy. However, there are still issues that impede th...
| Main Authors: | Salji, Mohd Rafiz, Udzir, Nur Izura, Ninggal, Mohd Izuan Hafez, Mohd Sani, Nor Fazlida, Ibrahim, Hamidah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
NADIA
2016
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/52915/ http://psasir.upm.edu.my/id/eprint/52915/1/Role%20performance%20trust-based%20access%20control%20for%20protecting%20sensitive%20attributes.pdf |
Similar Items
Trust-based access control model with quantification method for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2022)
by: Salji, Mohd Rafiz, et al.
Published: (2022)
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019)
by: Salji, Mohd Rafiz, et al.
Published: (2019)
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018)
by: Salji, Mohd Rafiz, et al.
Published: (2018)
Access control model based on trust, purpose, and role in materialized view for privacy protection
by: Salji, Mohd Rafiz
Published: (2019)
by: Salji, Mohd Rafiz
Published: (2019)
An autonomous role and consideration of electronic health systems with access control in developed countries: a review
by: Salji, Mohd Rafiz, et al.
Published: (2023)
by: Salji, Mohd Rafiz, et al.
Published: (2023)
Blockchain-based access control scheme for secure shared personal health records over decentralised storage
by: Hussien, Hassan Mansur, et al.
Published: (2021)
by: Hussien, Hassan Mansur, et al.
Published: (2021)
Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2011)
by: Teo, Poh Kuang, et al.
Published: (2011)
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment
by: Abu Bakar, Azreena, et al.
Published: (2011)
by: Abu Bakar, Azreena, et al.
Published: (2011)
Smart-contract privacy preservation mechanism
by: Siraj, Muhammed, et al.
Published: (2023)
by: Siraj, Muhammed, et al.
Published: (2023)
Blockchain technology in the healthcare industry: trends and opportunities
by: Hussien, Hassan Mansur, et al.
Published: (2021)
by: Hussien, Hassan Mansur, et al.
Published: (2021)
Access control in open distributed systems
by: Udzir, Nur Izura, et al.
Published: (2012)
by: Udzir, Nur Izura, et al.
Published: (2012)
Scalable workflow scheduling algorithm for minimizing makespan and failure probability
by: Abdul Aziz, Maslina, et al.
Published: (2019)
by: Abdul Aziz, Maslina, et al.
Published: (2019)
A compact bit string accessibility map for secure XML query processing
by: Mirabi, Meghdad, et al.
Published: (2012)
by: Mirabi, Meghdad, et al.
Published: (2012)
Oil spill protection plan: The use of geographical information system (GIS) in storing and accessing coastal sensitivity index
by: Said, Mohamad Nor, et al.
Published: (2001)
by: Said, Mohamad Nor, et al.
Published: (2001)
Performance optimization of cloud storage in access control of Ciphertext Policy Attribute-based Encryption
by: Mohd Satar, Siti Dhalila
Published: (2023)
by: Mohd Satar, Siti Dhalila
Published: (2023)
A dynamic compressed accessibility map for secure XML querying and updating
by: Mirabi, Meghdad, et al.
Published: (2015)
by: Mirabi, Meghdad, et al.
Published: (2015)
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)
by: Roslan, Nuur Alifah, et al.
Published: (2020)
Privacy preserving social network data publication
by: Abawajy, Jemal H., et al.
Published: (2016)
by: Abawajy, Jemal H., et al.
Published: (2016)
Trusted-based scalable access control model for broadcast XML documents.
by: Halboob, Waleed, et al.
Published: (2013)
by: Halboob, Waleed, et al.
Published: (2013)
Toward efficient attribute-based searchable encryption for access control over blockchain
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
Aspect oriented approach to improvement role based access control systems
by: Hazaa, Muneer A., et al.
Published: (2009)
by: Hazaa, Muneer A., et al.
Published: (2009)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Mitigating data spoofing risks in Near Field Communication (NFC) read/write mode: an investigation into access control vulnerabilities and post-compromise recovery strategy
by: Megat Khalid, Puteri Shariza, et al.
Published: (2024)
by: Megat Khalid, Puteri Shariza, et al.
Published: (2024)
Privacy concern on social network sites: the role of protection motivation, trust and risk
by: Salleh, Norsaremah, et al.
Published: (2012)
by: Salleh, Norsaremah, et al.
Published: (2012)
Security policy integration based on role-based access control model in healthcare collaborative environments
by: Teo, Poh Kuang, et al.
Published: (2010)
by: Teo, Poh Kuang, et al.
Published: (2010)
Secure role based access control systems using aspect-orientation designing
by: Hazaa, Muneer A., et al.
Published: (2009)
by: Hazaa, Muneer A., et al.
Published: (2009)
Retrieving and identifying remnants of artefacts on local devices using Sync.com cloud
by: Ahmed, Abdulghani Ali, et al.
Published: (2024)
by: Ahmed, Abdulghani Ali, et al.
Published: (2024)
An extended access control list for local network protection from insider attacks
by: Muamer N., Mohammed
Published: (2011)
by: Muamer N., Mohammed
Published: (2011)
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014)
by: Teh, Jia Yew, et al.
Published: (2014)
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Evaluating institutional open access performance: Sensitivity analysis
by: Huang, Karl, et al.
Published: (2020)
by: Huang, Karl, et al.
Published: (2020)
Revocable and non-invertible multibiometric template protection based on matrix transformation
by: Jegede, Abayomi, et al.
Published: (2018)
by: Jegede, Abayomi, et al.
Published: (2018)
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012)
by: Daryabar, Farid, et al.
Published: (2012)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
The Impact of Social Media Influencer Attributes on Brand Trust and Sporting goods Purchase Intention and the Role of Gender: An Empirical Research on China
by: Yu, Tao
Published: (2022)
by: Yu, Tao
Published: (2022)
Role based access control for knowledge sharing in remote areas
by: Usino, Wendi, et al.
Published: (2011)
by: Usino, Wendi, et al.
Published: (2011)
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Access to managerial roles
by: New Straits Times,
Published: (2013)
by: New Straits Times,
Published: (2013)
Sensitivity analysis of an optimal access road location in hillyforest area: a GIS approach
by: Ismail, Mohd Hasmadi, et al.
Published: (2008)
by: Ismail, Mohd Hasmadi, et al.
Published: (2008)
Similar Items
-
Trust-based access control model with quantification method for protecting sensitive attributes
by: Salji, Mohd Rafiz, et al.
Published: (2022) -
Trust, purpose, and role-based access control model for privacy protection
by: Salji, Mohd Rafiz, et al.
Published: (2019) -
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018) -
Access control model based on trust, purpose, and role in materialized view for privacy protection
by: Salji, Mohd Rafiz
Published: (2019) -
An autonomous role and consideration of electronic health systems with access control in developed countries: a review
by: Salji, Mohd Rafiz, et al.
Published: (2023)