Daniel Servos

Daniel Servos

PhD, Computer Science

About

14
Publications
5,969
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
272
Citations

Publications

Publications (14)
Article
Full-text available
Attribute-based access control (ABAC) is a promising alternative to traditional models of access control (i.e., discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC)) that is drawing attention in both recent academic literature and industry application. However, formalization of a foundational mode...
Conference Paper
Full-text available
Attribute-Based Access Control (ABAC) is an emerging model of access control that has gained significant interest in both recent academic literature and industry application. However, to date there have been almost no attempts to incorporate the concept of dynamic delegation into ABAC. This work lays out a number of possible strategies for incorpor...
Conference Paper
Full-text available
Attribute-based access control (ABAC) is a promising alternative to traditional models of access control (i.e. discretionary access control (DAC), mandatory access control (MAC) and role-based access control (RBAC)) that is drawing attention in both recent academic literature and industry application. However, formalization of a foundational model...
Chapter
Efforts towards incorporating user-to-user delegation into Attribute-Based Access Control (ABAC) is an emerging new direction in ABAC research. A number of potential strategies for integrating delegation have been proposed in recent literature but few have been realized as full ABAC delegation models. This work formalizes one such strategy, entitle...
Thesis
Full-text available
Attribute-Based Access Control (ABAC) is a promising alternative to traditional models of access control (i.e. Discretionary Access Control (DAC), Mandatory Access Control (MAC) and Role-Based Access control (RBAC)) that has drawn attention in both recent academic literature and industry application. However, formalization of a foundational model o...
Conference Paper
Full-text available
Efforts towards incorporating user-to-user delegation into Attribute-Based Access Control (ABAC) is an emerging new direction in ABAC research. A number of potential strategies for integrating delegation have been proposed in recent literature but few have been realized as full ABAC delegation models. This work formalizes one such strategy, entitle...
Conference Paper
Full-text available
Attribute-Based Access Control (ABAC), a promising alternative to traditional models of access control, has gained significant attention in recent academic literature. This attention has lead to the creation of a number of ABAC models including our previous contribution, Hierarchical Group and Attribute-Based Access Control (HGABAC). However, to da...
Conference Paper
Full-text available
Attribute-Based Access Control (ABAC) is an emerging model of access control that has gained significant interest in both recent academic literature and industry application. However, to date there have been almost no attempts to incorporate the concept of dynamic delegation into ABAC. This work lays out a number of possible strategies for incorpor...
Article
We present several extensions to the ciphertext-policy attribute-based encryption CP-ABE scheme, first introduced by Bethencourt et al. in 2007, to support operation in a distributed environment with multiple attribute authorities. Unlike other efforts in creating a multi-authority attribute-based encryption schemes our extensions allow for each au...
Thesis
Full-text available
Cloud computing is a rapidly emerging computing paradigm which replaces static and expensive data centers, network and software infrastructure with dynamically scalable “cloud based” services offered by third party providers on an on-demand basis. However, with the potential for seemingly limitless scalability and reduced infrastructure costs comes...
Conference Paper
Cloud Computing has become an emerging computing paradigm which brings new opportunities and challenges to overcome. While the cloud provides seemingly limitless scalability and an alternative to expensive data center infrastructure, it raises new issues in regards to security and privacy as processing and storage tasks are handed over to third par...
Conference Paper
WITH the maturity of Web Services and Enterprise Service Oriented Architectures (SOA), new delivery and Web interaction models are now demonstrating how services can be traded outside traditional ownership and provisioning boundaries. The value of SOA comes from having an architecture that readily accommodates change. The more your business changes...

Network

Cited By

Projects

Project (1)
Project