Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Lattice-based access control

Known as: LBAC, Lattice, Security lattice 
In computer security, lattice-based access control (LBAC) is a complex access control model based on the interaction between any combination of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Preventing implicit information flows by dynamic program analysis requires coarse approximations that result in false positives… Expand
  • figure 1
  • figure 2
  • figure 4
  • table I
  • figure 5
2014
2014
Federated cloud systems increase the reliability and reduce the cost of computational support to an organization. However, the… Expand
  • figure 2
  • table II
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2012
Highly Cited
2012
Recently, there has been considerable interest in attribute based access control (ABAC) to overcome the limitations of the… Expand
  • table 1
  • figure 1
  • table 2
  • table 4
  • table 5
2010
2010
Information flow control systems provide the guarantees that are required in today's security-relevant systems. While the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2009
Review
2009
We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or… Expand
  • table I
  • figure 1
  • table II
  • figure 2
  • figure 3
Highly Cited
2006
Highly Cited
2006
Location-based Access Control (LBAC) techniques allow taking users' physical location into account when determining their access… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
Highly Cited
2004
Highly Cited
2004
Interoperation and information sharing among databases independently developed and maintained by different organizations is today… Expand
Highly Cited
2000
Highly Cited
2000
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary… Expand
  • figure 5
  • figure 8
Highly Cited
1996
Highly Cited
1996
Role-based access control (RBAC) is a promising alternative to traditional discretionary and mandatory access controls. In RBAC… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
1993
Review
1993
Lattice-based access control models were developed in the early 1970s to deal with the confidentiality of military information… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5