Results 21 to 30 of about 5,834,162 (365)

Efficient and Flexible Role-Based Access Control (EFRBAC) Mechanism for Cloud [PDF]

open access: diamondEAI Endorsed Transactions on Scalable Information Systems, 2020
The cloud reduces the user’s burden to many folds. But cloud providers and cloud users with dynamic relationship, are in distinct security domains. Amongst various challenges with cloud, the crucial one is to detect and protect the user’s data from ...
Shilpi Harnal, R.K. Chauhan
doaj   +3 more sources

Cryptographic Role-Based Access Control, Reconsidered [PDF]

open access: yes, 2022
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Access Control (RBAC). Inspired by the study of the relation between the existing security definitions for such system, we identify two different types of attacks which cannot be captured by the existing ones.
Bin Liu   +2 more
openaire   +5 more sources

Self-Adaptive Role-Based Access Control for Business Processes [PDF]

open access: yesInternational Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2017
© 2017 IEEE. We present an approach for dynamically reconfiguring the role-based access control (RBAC) of information systems running business processes, to protect them against insider threats. The new approach uses business process execution traces and
Calinescu, R   +3 more
core   +3 more sources

Lambda-RBAC: Programming with Role-Based Access Control [PDF]

open access: diamondLogical Methods in Computer Science, 2008
We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanisms, which permit access controls to be expressed, in situ, as part of the code realizing basic functionality.
Radha Jagadeesan   +3 more
doaj   +2 more sources

Role-based access control in DCOM [PDF]

open access: greenJournal of Systems Architecture, 2000
The explosive growth of the Web, the increasing popularity of PCs and the advances in high-speed network access have brought distributed computing into the mainstream. To simplify network programming and to realize component-based software architecture, distributed object models have emerged as standards.
Gail‐Joon Ahn
openaire   +3 more sources

Analyzing temporal role based access control models [PDF]

open access: green, 2012
Today, Role Based Access Control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes.
Atluri, Vijayalakshmi   +6 more
core   +2 more sources

Role-Based Access Controls [PDF]

open access: yes15th National Computer Security Conference, Baltimore, MD. October 13-16, 1992, 2009
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many ...
Ferraiolo, David F., Kuhn, D. Richard
openaire   +3 more sources

Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model [PDF]

open access: goldSymmetry, 2019
A major development in the field of access control is the dominant role-based access control (RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the concept of roles. In addition, attribute-based access control (ABAC) is added
Muhammad Umar Aftab   +6 more
openalex   +2 more sources

A secure, constraint-aware role-based access control interoperation framework [PDF]

open access: green, 2011
With the growing needs for and the benefits of sharing resources and information among different organizations, an interoperation framework that automatically integrates policies to facilitate such cross-domain sharing in a secure way is becoming ...
Baracaldo, N, Joshi, J, Masoumzadeh, A
core   +3 more sources

Security analysis in role-based access control [PDF]

open access: greenProceedings of the ninth ACM symposium on Access control models and technologies, 2004
The administration of large role-based access control (RBAC) systems is a challenging problem. In order to administer such systems, decentralization of administration tasks by the use of delegation is an effective approach. While the use of delegation greatly enhances flexibility and scalability, it may reduce the control that an ...
Mahesh V. Tripunitara, Ninghui Li
openaire   +4 more sources

Home - About - Disclaimer - Privacy