Results 1 to 10 of about 1,891,300 (298)

A Novel Role-based Access Control Model in Cloud Environments [PDF]

open access: goldInternational Journal of Computational Intelligence Systems, 2016
In Cloud environments, the relationship between resources and users is more ad hoc and dynamic. The role-based access control (RBAC) model is an appropriate access control model for Cloud environments.
Jun Luo   +3 more
doaj   +3 more sources

Health Information System Role-Based Access Control Current Security Trends and Challenges. [PDF]

open access: yesJ Healthc Eng, 2018
Objective This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that
de Carvalho Junior MA, Bandiera-Paiva P.
europepmc   +2 more sources

A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach. [PDF]

open access: yesSensors (Basel), 2019
Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations.
Figueroa-Lorenzo S   +2 more
europepmc   +2 more sources

RBAC-SC: Role-Based Access Control Using Smart Contract

open access: yesIEEE Access, 2018
The role-based access control (RBAC) framework is a mechanism that describes the access control principle. As a common interaction, an organization provides a service to a user who owns a certain role that was issued by a different organization.
Jason Paul Cruz   +2 more
doaj   +2 more sources

Fabrication of Flexible Role-Based Access Control Based on Blockchain for Internet of Things Use Cases

open access: yesIEEE Access, 2023
The Internet of Things (IoT) connects many objects and allows continuous communication and data sharing has emerged as a revolutionary technology. However, expanding IoT devices has raised concerns regarding data security and access control.
Tanzeel Zaidi   +4 more
doaj   +2 more sources

Efficient and Flexible Role-Based Access Control (EFRBAC) Mechanism for Cloud [PDF]

open access: diamondEAI Endorsed Transactions on Scalable Information Systems, 2020
The cloud reduces the user’s burden to many folds. But cloud providers and cloud users with dynamic relationship, are in distinct security domains. Amongst various challenges with cloud, the crucial one is to detect and protect the user’s data from ...
Shilpi Harnal, R.K. Chauhan
doaj   +3 more sources

Managing Constraints in Role Based Access Control

open access: yesIEEE Access, 2020
Role-based access control (RBAC) is the most popular access control model currently adopted in several contexts to define security management. Constraints play a crucial role since they can drive the selection of the best representation of the ...
Carlo Blundo   +2 more
doaj   +2 more sources

Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model [PDF]

open access: goldSymmetry, 2019
A major development in the field of access control is the dominant role-based access control (RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the concept of roles. In addition, attribute-based access control (ABAC) is added
Muhammad Umar Aftab   +6 more
openalex   +2 more sources

An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment

open access: yesIEEE Access, 2023
In today’s world, services are improved and advanced in every field of life. Especially in the health sector, information technology (IT) plays a vigorous role in electronic health (e-health).
Ateeq Ur Rehman Butt   +6 more
doaj   +2 more sources

A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control

open access: yesIEEE Access, 2019
Access control is fundamental and prerequisite to govern and safeguard information assets within an organisation. Organisations generally use web enabled remote access coupled with applications access distributed on the various networks facing various ...
Mumina Uddin   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy