Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,984,584 papers from all fields of science
Search
Sign In
Create Free Account
Lattice-based access control
Known as:
LBAC
, Lattice
, Security lattice
In computer security, lattice-based access control (LBAC) is a complex access control model based on the interaction between any combination of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Access control
Access control list
Biba Model
Capability-based security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Verifying Secure Information Flow in Federated Clouds
W. Zeng
,
M. Koutny
,
P. Watson
IEEE International Conference on Cloud Computing…
2014
Corpus ID: 15386889
Federated cloud systems increase the reliability and reduce the cost of computational support to an organization. However, the…
Expand
2014
2014
Enabling location-based policies in a healthcare cloud computing environment
Sebastian Zickau
,
Dirk Thatmann
,
Tatiana Ermakova
,
Jonas Repschläger
,
Rüdiger Zarnekow
,
Axel Küpper
IEEE 3rd International Conference on Cloud…
2014
Corpus ID: 600838
In a multi-stakeholder cloud computing environment, data access control is of essential importance. Nowadays, it is usually…
Expand
2012
2012
A lattice interpretation of group-centric collaboration with expedient insiders
K. Bijon
,
Tahmina Ahmed
,
R. Sandhu
,
R. Krishnan
International Conference on Collaborative…
2012
Corpus ID: 7181271
For various reasons organizations need to collaborate with external consultants, e.g. domain specialists, on specific projects…
Expand
2012
2012
Efficient Evaluation of Location Predicates for Access Control Systems
Philipp Marcus
,
Claudia Linnhoff-Popien
Sixth UKSim/AMSS European Symposium on Computer…
2012
Corpus ID: 2294257
Often, mobile access to services needs to be controlled based on the current location of a user. However, typically the user…
Expand
2011
2011
A Mandatory Access Control Model Based on Concept Lattice
Zhang Lei
,
Hongli Zhang
,
Yin Lihua
,
Xiajiong Shen
International Conference on Network Computing and…
2011
Corpus ID: 15524179
Confidentiality and integrity of information are basic attributes of information security, but the existing access control models…
Expand
Review
2009
Review
2009
Design of a lattice-based access control scheme
C. Chiang
,
Coskun Bayrak
,
+7 authors
Xiaoran Wang
IEEE International Conference on Systems, Man and…
2009
Corpus ID: 7776946
We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or…
Expand
2009
2009
Building access control models with attribute exploration
S. Obiedkov
,
D. Kourie
,
J. Eloff
Computers & security
2009
Corpus ID: 6868833
2008
2008
A lattice-based access control model
Li Qing-hai
2008
Corpus ID: 64355926
A new access control model is described.All possible access control privileges pertaining to an object can be represented as the…
Expand
2006
2006
Label-based access control (LBAC) in DB2 LUW
Walid Rjaibi
Conference on Privacy, Security and Trust
2006
Corpus ID: 940430
data at the row and/or column level based on security labels. Unlike traditional implementations of mandatory access control (e.g…
Expand
1996
1996
Role Hierarchies and Constraints for Lattice-based Access Controls
R. Sandhu
1996
Corpus ID: 260927467
Role-based access control (RBAC) is a promising alternative to traditional discretionary and mandatory access controls. In RBAC…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE