Lattice-based access control
Semantic Scholar uses AI to extract papers important to this topic.
Preventing implicit information flows by dynamic program analysis requires coarse approximations that result in false positives… Expand Federated cloud systems increase the reliability and reduce the cost of computational support to an organization. However, the… Expand Recently, there has been considerable interest in attribute based access control (ABAC) to overcome the limitations of the… Expand Information flow control systems provide the guarantees that are required in today's security-relevant systems. While the… Expand We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or… Expand Location-based Access Control (LBAC) techniques allow taking users' physical location into account when determining their access… Expand Interoperation and information sharing among databases independently developed and maintained by different organizations is today… Expand Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary… Expand Role-based access control (RBAC) is a promising alternative to traditional discretionary and mandatory access controls. In RBAC… Expand Lattice-based access control models were developed in the early 1970s to deal with the confidentiality of military information… Expand