Keywords = Access Control
Number of Articles: 7
1. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

Volume 10, Issue 2, Summer and Autumn 2018, Pages 129-139

10.22042/isecure.2018.126294.414

N. Soltani; R. Bohlooli; R. Jalili


3. Access control in ultra-large-scale systems using a data-centric middleware

Volume 6, Issue 1, Winter and Spring 2014, Pages 3-22

10.22042/isecure.2014.6.1.2

S. Shokrollahi; F. Shams; J. Esmaeili


4. A centralized privacy-preserving framework for online social networks

Volume 6, Issue 1, Winter and Spring 2014, Pages 35-52

10.22042/isecure.2014.6.1.4

F. Raji; A. Miri; M. Davarpanah Jazi


6. Authorization models for secure information sharing: a survey and research agenda

Volume 2, Issue 2, Summer and Autumn 2010, Pages 69-87

10.22042/isecure.2015.2.2.2

F. Salim; J. Reid; E. Dawson