• Publications
  • Influence
A generalized temporal role-based access control model
TLDR
This work proposes a generalized temporal role-based access control (GTRBAC) model capable of expressing a wider range of temporal constraints and allows expressing periodic as well as duration constraints on roles, user-role assignments, and role-permission assignments. Expand
TRBAC: a temporal role-based access control model
TLDR
Temporal-RBAC (TRBAC), an extensions of the RBAC model, supports both periodic activations and deactivations of roles, and temporal dependencies among such actions, expressed by means of role triggers. Expand
GEO-RBAC: a spatially aware RBAC
TLDR
This paper presents GEO-RBAC, an extension of the RBAC model to deal with spatial and location-based information and introduces the concept of role schema, which is extended to cope with hierarchies, modeling permission, user, and activation inheritance. Expand
The specification and enforcement of authorization constraints in workflow management systems
TLDR
A language is presented to express both static and dynamic authorization constraints as clauses in a logic program and formal notions of constraint consistency are provided to check the consistency of constraints and assign users and roles to tasks that constitute the workflow in such a way that no constraints are violated. Expand
State-of-the-art in privacy preserving data mining
TLDR
An overview of the new and rapidly emerging research area of privacy preserving data mining is provided, and a classification hierarchy that sets the basis for analyzing the work which has been performed in this context is proposed. Expand
Efficient k -Anonymization Using Clustering Techniques
TLDR
An approach that uses the idea of clustering to minimize information loss and thus ensure good data quality is proposed, and a suitable metric to estimate the information loss introduced by generalizations is developed, which works for both numeric and categorical data. Expand
Secure and selective dissemination of XML documents
TLDR
This article defines a formal model of access control policies for XML documents and proposes an approach, based on an extension of the Cryptolope#8482; approach, which essentially allows one to send the same document to all users, and yet to enforce the statedAccess control policies. Expand
TRBAC: A temporal role-based access control model
TLDR
Temporal-RBAC (TRBAC), an extension of the RBAC model, is introduced, which supports periodic role enabling and disabling, and temporal dependencies among such actions, expressed by means of role triggers. Expand
Association rule hiding
TLDR
This work investigates confidentiality issues of a broad category of rules, the association rules, and presents three strategies and five algorithms for hiding a group of associationrules, which is characterized as sensitive. Expand
Database security - concepts, approaches, and challenges
TLDR
The most relevant concepts underlying the notion of database security are surveyed and the most well-known techniques are summarized, and access control systems are described, namely, the discretionary and mandatory access control models, and the role-based access control (RBAC) model. Expand
...
1
2
3
4
5
...