Harrison, M. A., Ruzzo, W. L., and Ullman, J. D. (1975).
On Protection in Operating Systems. Operating Sys-
tems Review, special issue for the 5th Symposium on
Operating Systems Principles, 9(5):14–24.
Hussein, N. H., Yaw, C. T., Koh, S. P., Tiong, S. K., and
Chong, K. H. (2022). A comprehensive survey on
vehicular networking: Communications, applications,
challenges, and upcoming research directions. IEEE
Access, 10:86127–86180.
INCITS (2013). Information technology — Next Gen-
eration Access Control — Functional Architecture
(NGAC-FA). INCITS 499–2013, American National
Standards Institute.
Khan, A. and Fong, P. (2012). Satisfiability and Feasibil-
ity in a Relationship-Based Workflow Authorization
Model. In Foresti, S., Yung, M., and Martinelli, F.,
editors, Computer Security – ESORICS 2012, volume
7459 of Lecture Notes in Computer Science, pages
109–126. Springer Berlin / Heidelberg.
K
¨
uhnhauser, W. E. (1999). Policy Groups. Elsevier Com-
puters & Security, 18(4):351–363.
Li, H., Pei, L., Liao, D., Chen, S., Zhang, M., and Xu, D.
(2020). FADB: A fine-grained access control scheme
for VANET data based on blockchain. IEEE Access,
8:85190–85203.
Li, N., Mitchell, J. C., and Winsborough, W. H. (2005). Be-
yond Proof-of-compliance: Security Analysis in Trust
Management. Journal of the ACM, 52(3):474–514.
Li, N., Wang, Q., Qardaji, W., Bertino, E., Rao, P., Lobo,
J., and Lin, D. (2009). Access Control Policy Com-
bining: Theory Meets Practice. In Proceedings of
the 14th ACM Symposium on Access Control Mod-
els and Technologies, SACMAT ’09, pages 135–144,
New York, NY, USA. ACM.
Liu, L., Chen, C., Pei, Q., Maharjan, S., and Zhang,
Y. (2020). Vehicular edge computing and network-
ing: A survey. Mobile Networks and Applications,
26(3):1145–1168.
Liu, X., Chen, W., and Xia, Y. (2022). Security-aware in-
formation dissemination with fine-grained access con-
trol in cooperative multi-RSU of VANETs. IEEE
Transactions on Intelligent Transportation Systems,
23(3):2170–2179.
Marinovic, S., Craven, R., Ma, J., and Dulay, N. (2011).
Rumpole: a Flexible Break-glass Access Control
Model. In Proceedings of the 16th ACM Symposium
on Access Control Models and Technologies, SAC-
MAT ’11, pages 73–82. ACM.
Mazzola, M., Schaaf, G., Niewels, F., and Kurner, T.
(2015). Exploration of centralized Car2X-systems
over LTE. In 2015 IEEE 81st Vehicular Technology
Conference (VTC Spring). IEEE.
Meneguette, R., Grande, R. D., Ueyama, J., Filho, G. P. R.,
and Madeira, E. (2021). Vehicular edge comput-
ing: Architecture, resource management, security, and
challenges. ACM Computing Surveys, 55(1):1–46.
Ni, Q., Bertino, E., and Lobo, J. (2009). D-algebra for
Composing Access Control Policy Decisions. In Pro-
ceedings of the 4th International Symposium on In-
formation, Computer, and Communications Security,
ASIACCS ’09, pages 298–309, New York, NY, USA.
ACM.
OASIS (2013). eXtensible Access Control Markup Lan-
guage (XACML) Version 3.0. OASIS Standard 499–
2013, Organization for the Advancement of Struc-
tured Information Standards.
Sandhu, R. S. (1992). The Typed Access Matrix Model.
In Proceedings of the 1992 IEEE Symposium on Secu-
rity and Privacy, SP ’92, pages 122–136, Washington,
DC, USA. IEEE Computer Society.
Schlegel, M. and Amthor, P. (2020). Beyond Administra-
tion: A Modeling Scheme Supporting the Dynamic
Analysis of Role-based Access Control Policies. In
Samarati, P., di Vimercati, S. D. C., Obaidat, M. S.,
and Ben-Othman, J., editors, Proceedings of the 17th
International Conference on Security and Cryptog-
raphy, SECRYPT 2020, pages 431–442. INSTICC,
SciTePress.
Schlegel, M. and Amthor, P. (2021). The Missing Piece of
the ABAC Puzzle: A Modeling Scheme for Dynamic
Analysis. In di Vimercati, S. D. C. and Samarati, P.,
editors, Proceedings of the 18th International Confer-
ence on Security and Cryptography, SECRYPT 2021,
pages 234–246. INSTICC, SciTePress.
Schlegel, M. and Amthor, P. (2023). Putting the Pieces
Together: Model-Based Engineering Workflows for
Attribute-Based Access Control Policies. In Sama-
rati, P., van Sinderen, M., di Vimercati, S. D. C., and
Wijnhoven, F., editors, E-Business and Telecommu-
nications, volume 1795 of Communications in Com-
puter and Information Science (CCIS), pages 249–
280. Springer Nature Switzerland, Cham.
Sharma, S. and Kaul, A. (2021). VANETs cloud: Architec-
ture, applications, challenges, and issues. Archives of
Computational Methods in Engineering, 28(4):2081–
2102.
Wijesekera, D. and Jajodia, S. (2003). A propositional pol-
icy algebra for access control. ACM Trans. Inf. Syst.
Secur., 6(2):286–325.
Yang, C., Jiang, P., and Zhu, L. (2022). Accelerating de-
centralized and partial-privacy data access for VANET
via online/offline functional encryption. IEEE Trans-
actions on Vehicular Technology, 71(8):8944–8954.
Zhou, Z., Gaurav, A., Gupta, B. B., Lytras, M. D., and Raz-
zak, I. (2022). A fine-grained access control and secu-
rity approach for intelligent vehicular transport in 6G
communication system. IEEE Transactions on Intel-
ligent Transportation Systems, 23(7):9726–9735.
SECRYPT 2024 - 21st International Conference on Security and Cryptography
90