with a large number of employees and administra-
tors through different case studies. The objective is
to evaluate the efficiency of the tool to improve both
authoring tool and policy generation. Finally, we plan
to test the usability of the system with employees with
particular health conditions (such as post-stroke pa-
tients) by considering various profile-based rules that
include personalized spatial and temporal constraints.
REFERENCES
B
ˇ
adic
ˇ
a, C., Braubach, L., and Paschke, A. (2011). Rule-
based distributed and agent systems. In International
Workshop on Rules and Rule Markup Languages for
the Semantic Web, pages 3–28. Springer.
Calo, S., Verma, D., Chakraborty, S., Bertino, E., Lupu, E.,
and Cirincione, G. (2018). Self-generation of access
control policies. In Proceedings of the 23nd ACM on
Symposium on Access Control Models and Technolo-
gies, pages 39–47.
Corradi, A., Montanari, R., and Tibaldi, D. (2004). Context-
based access control for ubiquitous service provision-
ing. In Proceedings of the 28th International Com-
puter Software and Applications Conference, pages
444–451. IEEE.
Damiani, M. L., Bertino, E., Catania, B., and Perlasca, P.
(2007). Geo-rbac: a spatially aware rbac. ACM Trans-
actions on Information and System Security, 10(1).
Ferraiolo, D., Chandramouli, R., Kuhn, R., and Hu, V.
(2016). Extensible access control markup language
(xacml) and next generation access control (ngac).
In International Workshop on Attribute Based Access
Control, pages 13–24.
Freudenthal, E., Pesin, T., Port, L., Keenan, E., and Karam-
cheti, V. (2002). drbac: distributed role-based ac-
cess control for dynamic coalition environments. In
Proceedings 22nd International Conference on Dis-
tributed Computing Systems, pages 411–420. IEEE.
Hosseinzadeh, S., Virtanen, S., D
´
ıaz-Rodr
´
ıguez, N., and
Lilius, J. (2016). A semantic security framework and
context-aware role-based access control ontology for
smart spaces. In Workshop on Semantic Big Data,
pages 1–6.
Joshi, J. B., Bertino, E., Latif, U., and Ghafoor, A. (2005). A
generalized temporal role-based access control model.
IEEE transactions on knowledge and data engineer-
ing, 17(1):4–23.
Katuu, S. (2018). A comparative assessment of enter-
prise content management maturity models. In E-
manufacturing and e-service strategies in contempo-
rary organizations, pages 93–118. IGI Global.
Kayes, A., Han, J., Rahayu, W., Dillon, T., Islam, M. S.,
and Colman, A. (2019). A policy model and frame-
work for context-aware access control to information
resources. The Computer Journal, 62(5):670–705.
Kulkarni, D. and Tripathi, A. (2008). Context-aware role-
based access control in pervasive computing systems.
In Access control models and technologies, pages
113–122.
Liu, Q., Zhang, H., Wan, J., and Chen, X. (2017). An access
control model for resource sharing based on the role-
based access control intended for multi-domain man-
ufacturing internet of things. IEEE Access, 5:7001–
7011.
Nyakomitta, P. S. and Abeka, S. O. (2020). Security inves-
tigation on remote access methods of virtual private
network. Global Journal of Computer Science and
Technology.
Oluwatimi, O., Damiani, M. L., and Bertino, E. (2018). A
context-aware system to secure enterprise content: In-
corporating reliability specifiers. Computers & Secu-
rity, 77:162–178.
Pal, V. (2016). Alfresco for Administrators. Packt Publish-
ing Ltd.
Russell, S. and Norvig, P. (2002). Artificial intelligence: a
modern approach.
Sandhu, R. S. and Samarati, P. (1994). Access control: prin-
ciple and practice. IEEE communications magazine,
32(9):40–48.
Squicciarini, A. C., Shehab, M., and Paci, F. (2009). Col-
lective privacy management in social networks. In
Proceedings of the 18th international conference on
World wide web, pages 521–530.
Trnka, M. and Cerny, T. (2016). On security level usage in
context-aware role-based access control. In Proceed-
ings of the 31st ACM Symposium on Applied Comput-
ing, pages 1192–1195.
Uddin, I. (2019). A rule-based framework for developing
context-aware systems for smart spaces. PhD thesis,
University of Nottingham.
Verma, D., Calo, S., Chakraborty, S., Bertino, E., Williams,
C., Tucker, J., and Rivera, B. (2017). Generative pol-
icy model for autonomic management. In 2017 IEEE
SmartWorld, Ubiquitous Intelligence & Computing,
pages 1–6. IEEE.
Wong, K. and Hunter, A. (2017). Bluetooth for decoy sys-
tems: A practical study. In 2017 IEEE Conference on
Communications and Network Security (CNS), pages
86–387. IEEE.
Zheng, J., Zhang, Q., Zheng, S., and Tan, Y. (2011). Dy-
namic role-based access control model. Journal of
software, 6(6).
SECRYPT 2021 - 18th International Conference on Security and Cryptography
652