Skip to main content

Data Security and Privacy

  1. The group signature scheme is an important primitive in cryptography, it allows members in a group to generate signatures anonymously on behalf of the whole group. In view of the practical application of such ...

    Authors: Yiru Sun, Yanyan Liu and Bo Wu

    Citation: Cybersecurity 2019 2:21

    Content type: Research

    Published on:

  2. Role-Based Access Control (RBAC) policies are at the core of Cybersecurity as they ease the enforcement of basic security principles, e.g., Least Privilege and Separation of Duties. As ICT systems and business pr...

    Authors: Marco Benedetti and Marco Mori

    Citation: Cybersecurity 2019 2:19

    Content type: Research

    Published on:

  3. A main challenge of attribute-based access control (ABAC) is the handling of missing information. Several studies have shown that the way standard ABAC mechanisms, e.g. based on XACML, handle missing informati...

    Authors: Charles Morisset, Tim A. C. Willemse and Nicola Zannone

    Citation: Cybersecurity 2019 2:6

    Content type: Research

    Published on: