Projects per year
Abstract
This paper addresses some of the limitations of current hybrid access control models, in particular the issues surrounding managed rights inheritance, a model’s consistency and its ability to reflect changes in environment without losing integrity or flexibility. Our approach describes a layered model design which allows more or less detail to be added, in real-time, to reflect changes in the real world. The model provides time-based inherited access control following the principles of zero trust to minimise risk whilst preserving its integrity and flexibility. This paper concludes by providing a comparison of how our approach differs from traditional techniques and the areas in which improvements can be seen.
| Original language | English |
|---|---|
| Title of host publication | 2024 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM) |
| Publisher | IEEE |
| Pages | 1-7 |
| Number of pages | 7 |
| ISBN (Electronic) | 979-8-3503-6792-8 |
| ISBN (Print) | 979-8-3503-6793-5 |
| DOIs | |
| Publication status | E-pub ahead of print - 18 Dec 2024 |
| Event | 2024 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM 2024): ICT-DM 2024 - Setif 1 University - Ferhat ABBAS, Setif, Algeria Duration: 19 Nov 2024 → 21 Nov 2024 https://ict-dm2024.univ-setif.dz/ |
Publication series
| Name | |
|---|---|
| Publisher | IEEE |
| ISSN (Print) | 2469-8822 |
| ISSN (Electronic) | 2643-6868 |
Conference
| Conference | 2024 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM 2024) |
|---|---|
| Country/Territory | Algeria |
| City | Setif |
| Period | 19/11/24 → 21/11/24 |
| Internet address |
Bibliographical note
© 2024 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders.
This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it.
Keywords
- Access control
- Disaster management
- Data models
- Real-time systems
- Zero Trust
- Information and communication technology
- Iterative methods
Fingerprint
Dive into the research topics of 'Towards a Zero Trust Based Hybrid Access Control Model for Medical Data'. Together they form a unique fingerprint.Projects
- 1 Finished
-
A Novel Framework for Secure and Privacy-Preserving Access to Healthcare Resources
Djahel, S. (Principal Investigator)
1/04/19 → 31/03/25
Project: Research