Results 41 to 50 of about 5,834,162 (365)

Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review

open access: yesJournal of Cybersecurity and Privacy, 2022
As the functionality and services provided by cloud computing increase, control access to these services becomes more complex, and more security breaches are generated. This is mainly based on the emergence of new requirements and constraints in the open,
Abdulghafour Mohammad
doaj   +1 more source

Multi-Level Security Model Developed to Provide Data Privacy in Distributed Database Systems

open access: yesTehnički Vjesnik, 2022
Information security is related to efforts put in to avoid activities such as unauthorized usage, changing or disseminating of information by having access to these pieces of information.
Cigdem Bakir*, Mehmet Guclu
doaj   +1 more source

Application of role-based access control in cyber security of substation

open access: yesZhejiang dianli, 2022
By following the encrypted communication proposed by IEC 62351-3 and the identity authentication technology by IEC 62351-4, the paper carries out research on role-based access control technology on the theoretical basis of IEC 62351-8.
RUAN Lixiang   +3 more
doaj   +1 more source

Blockchain-based Role-Delegation Access Control for Industrial Control System [PDF]

open access: yesJisuanji kexue, 2021
The concept of "network perimeter" in industrial control system is becoming vague due to the integration of IT and OT technology.The fine-grained access control strategy that intends to protect each network connection can ensure the network security of ...
GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di
doaj   +1 more source

Role-Based Access Control in Retrospect [PDF]

open access: yesComputer, 2012
A review of the state of the art of role-based access control can help practitioners assess RBAC's applicability to their organization and indicates where more research is needed to improve the RBAC model.
Virginia N. L. Franqueira, Roel Wieringa
openaire   +4 more sources

Role Minimization Optimization Algorithm Based on Concept Lattice Factor

open access: yesMathematics, 2023
Role-based access control (RBAC) is a widely adopted security model that provides a flexible and scalable approach for managing permissions in various domains.
Tao Wang, Qiang Wu
doaj   +1 more source

An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach

open access: yesInf., 2022
The area of smart homes is one of the most popular for deploying smart connected devices. One of the most vulnerable aspects of smart homes is access control.
Safwa Ameer, James O. Benson, R. Sandhu
semanticscholar   +1 more source

Towards Secure, Flexible and Efficient Role Based Hospital’s Cloud Management System: Case Study [PDF]

open access: yesEAI Endorsed Transactions on Pervasive Health and Technology, 2020
INTRODUCTION: Many organizations of health care have recognized that quality of service can be improved bymaintaining e-records of patient’s reports, medical histories, surgeries recordings, etc.
Shilpi Harnal, R.K. Chauhan
doaj   +1 more source

Intelligent Role-Based Access Control Model and Framework Using Semantic Business Roles in Multi-Domain Environments

open access: yesIEEE Access, 2020
Today’s rapidly developing communication technologies and dynamic collaborative business models made the security of data and resources more crucial than ever especially in multi-domain environments like Cloud and Cyber-Physical Systems (CPS).
Rubina Ghazal   +5 more
semanticscholar   +1 more source

Delegation in Role-Based Access Control [PDF]

open access: yesInternational Journal of Information Security, 2006
User delegation is a mechanism for assigning access rights available to one user to another user. A delegation can either be a grant or transfer operation. Existing work on delegation in the context of role-based access control models has extensively studied grant delegations, but transfer delegations have largely been ignored.
Hemanth Khambhammettu, Jason Crampton
openaire   +2 more sources

Home - About - Disclaimer - Privacy