Keywords = Access Control
Number of Articles: 7
1. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

Volume 10, Issue 2, Summer and Autumn 2018, Pages 129-139

N. Soltani; R. Bohlooli; R. Jalili


2. A combination of semantic and attribute-based access control model for virtual organizations

Volume 7, Issue 1, Winter and Spring 2015, Pages 27-45

M. Amini; M. Arasteh


3. Access control in ultra-large-scale systems using a data-centric middleware

Volume 6, Issue 1, Winter and Spring 2014, Pages 3-22

S. Shokrollahi; F. Shams; J. Esmaeili


4. A centralized privacy-preserving framework for online social networks

Volume 6, Issue 1, Winter and Spring 2014, Pages 35-52

F. Raji; A. Miri; M. Davarpanah Jazi


5. A semantic-aware role-based access control model for pervasive computing environments

Volume 5, Issue 2, Summer and Autumn 2013, Pages 119-140

A. Javadi; M. Amini


6. Authorization models for secure information sharing: a survey and research agenda

Volume 2, Issue 2, Summer and Autumn 2010, Pages 69-87

F. Salim; J. Reid; E. Dawson


7. A context-sensitive dynamic role-based access control model for pervasive computing environments

Volume 2, Issue 1, Winter and Spring 2010, Pages 47-66

S. Sadat Emami; S. Zokaei