Results 21 to 30 of about 251,382 (296)

Inter-ReBAC:Inter-operation of Relationship-Based Access Control Model Instances [PDF]

open access: yes, 2016
Part 3: Access ControlInternational audienceRelationship-based access control (ReBAC) models define authorization policies and make authorization decisions on the basis of relationships between the entities in a system.
Crampton, Jason, Sellwood, James
core   +3 more sources

Comparative Analysis of Selected Programming Frameworks in terms of their Suitability for User Authentication and Authorization

open access: yesJournal of Computer Sciences Institute, 2023
The aim of the article was to perform a comparative analysis of the Net 6 and NestJS programming framework in terms of their suitability for user authentication and authorization.
Przemysław Rodzik
doaj   +1 more source

Operational-Investigative Activities of Judicial Authorization: Features of Performance [PDF]

open access: yesSHS Web of Conferences, 2021
The scientific article is devoted to the study of issues related to the peculiarities of performing operational-investigative activities of judicial authorization enshrined in the Federal Law “On operational-investigative activities” The questions of ...
Ahmedov Ahmed Guseinovich   +3 more
doaj   +1 more source

A flexible architecture for privacy-aware trust management [PDF]

open access: yes, 2010
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different participants trust each other. As trust may depend on many different factors,
Böhm, Klemens   +6 more
core   +6 more sources

Self-adaptive federated authorization infrastructures [PDF]

open access: yes, 2014
Authorization infrastructures are an integral part of any network where resources need to be protected. As networks expand and organizations start to federate access to their resources, authorization infrastructures become increasingly difficult to ...
Bailey   +28 more
core   +1 more source

On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]

open access: yes, 2008
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core   +9 more sources

Research and application of cross-domain data authorization and operation

open access: yes大数据, 2023
With the development of big data and cloud computing, data management is breaking down "data silos" and developing from isolated services for single domain to cross-domain data sharing and collaborative services.Based on the public data ...
Jilin ZHANG   +4 more
doaj  

Creating Objects in the Flexible Authorization Framework [PDF]

open access: yes, 2006
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not sufficient. Actually, IT systems can manipulate data to provide services to users.
Zannone, Nicola   +2 more
openaire   +3 more sources

Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities

open access: yesSensors, 2022
Security has always been the main concern for the internet of things (IoT)-based systems. Blockchain, with its decentralized and distributed design, prevents the risks of the existing centralized methodologies.
Muhammad Asif   +5 more
doaj   +1 more source

A Behavior-Authoring Framework for Multiactor Simulations

open access: yesIEEE Computer Graphics and Applications, 2011
Interest has been growing in the behavioral animation of autonomous actors in virtual worlds. However, authoring complicated interactions between multiple actors in a way that balances control flexibility and automation remains a considerable challenge.
Kapadia, Mubbasir   +3 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy