Results 21 to 30 of about 251,382 (296)
Inter-ReBAC:Inter-operation of Relationship-Based Access Control Model Instances [PDF]
Part 3: Access ControlInternational audienceRelationship-based access control (ReBAC) models define authorization policies and make authorization decisions on the basis of relationships between the entities in a system.
Crampton, Jason, Sellwood, James
core +3 more sources
The aim of the article was to perform a comparative analysis of the Net 6 and NestJS programming framework in terms of their suitability for user authentication and authorization.
Przemysław Rodzik
doaj +1 more source
Operational-Investigative Activities of Judicial Authorization: Features of Performance [PDF]
The scientific article is devoted to the study of issues related to the peculiarities of performing operational-investigative activities of judicial authorization enshrined in the Federal Law “On operational-investigative activities” The questions of ...
Ahmedov Ahmed Guseinovich +3 more
doaj +1 more source
A flexible architecture for privacy-aware trust management [PDF]
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different participants trust each other. As trust may depend on many different factors,
Böhm, Klemens +6 more
core +6 more sources
Self-adaptive federated authorization infrastructures [PDF]
Authorization infrastructures are an integral part of any network where resources need to be protected. As networks expand and organizations start to federate access to their resources, authorization infrastructures become increasingly difficult to ...
Bailey +28 more
core +1 more source
On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core +9 more sources
Research and application of cross-domain data authorization and operation
With the development of big data and cloud computing, data management is breaking down "data silos" and developing from isolated services for single domain to cross-domain data sharing and collaborative services.Based on the public data ...
Jilin ZHANG +4 more
doaj
Creating Objects in the Flexible Authorization Framework [PDF]
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not sufficient. Actually, IT systems can manipulate data to provide services to users.
Zannone, Nicola +2 more
openaire +3 more sources
Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities
Security has always been the main concern for the internet of things (IoT)-based systems. Blockchain, with its decentralized and distributed design, prevents the risks of the existing centralized methodologies.
Muhammad Asif +5 more
doaj +1 more source
A Behavior-Authoring Framework for Multiactor Simulations
Interest has been growing in the behavioral animation of autonomous actors in virtual worlds. However, authoring complicated interactions between multiple actors in a way that balances control flexibility and automation remains a considerable challenge.
Kapadia, Mubbasir +3 more
openaire +4 more sources

