Results 21 to 30 of about 5,834,162 (365)
Efficient and Flexible Role-Based Access Control (EFRBAC) Mechanism for Cloud [PDF]
The cloud reduces the user’s burden to many folds. But cloud providers and cloud users with dynamic relationship, are in distinct security domains. Amongst various challenges with cloud, the crucial one is to detect and protect the user’s data from ...
Shilpi Harnal, R.K. Chauhan
doaj +3 more sources
Cryptographic Role-Based Access Control, Reconsidered [PDF]
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Access Control (RBAC). Inspired by the study of the relation between the existing security definitions for such system, we identify two different types of attacks which cannot be captured by the existing ones.
Bin Liu+2 more
openaire +5 more sources
Self-Adaptive Role-Based Access Control for Business Processes [PDF]
© 2017 IEEE. We present an approach for dynamically reconfiguring the role-based access control (RBAC) of information systems running business processes, to protect them against insider threats. The new approach uses business process execution traces and
Calinescu, R+3 more
core +3 more sources
Lambda-RBAC: Programming with Role-Based Access Control [PDF]
We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanisms, which permit access controls to be expressed, in situ, as part of the code realizing basic functionality.
Radha Jagadeesan+3 more
doaj +2 more sources
Role-based access control in DCOM [PDF]
The explosive growth of the Web, the increasing popularity of PCs and the advances in high-speed network access have brought distributed computing into the mainstream. To simplify network programming and to realize component-based software architecture, distributed object models have emerged as standards.
Gail‐Joon Ahn
openaire +3 more sources
Analyzing temporal role based access control models [PDF]
Today, Role Based Access Control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes.
Atluri, Vijayalakshmi+6 more
core +2 more sources
Role-Based Access Controls [PDF]
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many ...
Ferraiolo, David F., Kuhn, D. Richard
openaire +3 more sources
Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model [PDF]
A major development in the field of access control is the dominant role-based access control (RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the concept of roles. In addition, attribute-based access control (ABAC) is added
Muhammad Umar Aftab+6 more
openalex +2 more sources
A secure, constraint-aware role-based access control interoperation framework [PDF]
With the growing needs for and the benefits of sharing resources and information among different organizations, an interoperation framework that automatically integrates policies to facilitate such cross-domain sharing in a secure way is becoming ...
Baracaldo, N, Joshi, J, Masoumzadeh, A
core +3 more sources
Security analysis in role-based access control [PDF]
The administration of large role-based access control (RBAC) systems is a challenging problem. In order to administer such systems, decentralization of administration tasks by the use of delegation is an effective approach. While the use of delegation greatly enhances flexibility and scalability, it may reduce the control that an ...
Mahesh V. Tripunitara, Ninghui Li
openaire +4 more sources