Skip to main content

Data Security and Privacy

  1. The group signature scheme is an important primitive in cryptography, it allows members in a group to generate signatures anonymously on behalf of the whole group. In view of the practical application of such ...

    Authors: Yiru Sun, Yanyan Liu and Bo Wu
    Citation: Cybersecurity 2019 2:21
  2. Role-Based Access Control (RBAC) policies are at the core of Cybersecurity as they ease the enforcement of basic security principles, e.g., Least Privilege and Separation of Duties. As ICT systems and business pr...

    Authors: Marco Benedetti and Marco Mori
    Citation: Cybersecurity 2019 2:19
  3. A main challenge of attribute-based access control (ABAC) is the handling of missing information. Several studies have shown that the way standard ABAC mechanisms, e.g. based on XACML, handle missing informati...

    Authors: Charles Morisset, Tim A. C. Willemse and Nicola Zannone
    Citation: Cybersecurity 2019 2:6