Results 91 to 100 of about 12,389 (249)
Towards Integrated Modelling of Dynamic Access Control with UML and Event-B [PDF]
Role-Based Access Control (RBAC) is a popular authorization model used to manage data-access constraints in a wide range of systems. RBAC usually defines the static view on the access rights. However, to ensure dependability of a system, it is often necessary to model and verify state-dependent access rights.
arxiv +1 more source
DemocracyGuard: Blockchain‐based secure voting framework for digital democracy
Abstract Online voting is gaining traction in contemporary society to reduce costs and boost voter turnout, allowing individuals to cast their ballots from anywhere with an internet connection. This innovation is cautiously met due to the inherent security risks, where a single vulnerability can lead to widespread vote manipulation.
Mritunjay Shall Peelam+3 more
wiley +1 more source
Migrating from DAC to RBAC [PDF]
Role Based Access Control (RBAC) is one of the most popular means for enforcing access control. One of the main reasons for this is that it is perceived as the least expensive configuration with respect to security administration. In this paper, we demonstrate that security administration is not always cheaper under RBAC when compared to the ...
David Lorenzi+4 more
openaire +3 more sources
Authorization recycling in hierarchical RBAC systems [PDF]
As distributed applications increase in size and complexity, traditional authorization architectures based on a dedicated authorization server become increasingly fragile because this decision point represents a single point of failure and a performance bottleneck.
Jason Crampton+3 more
openaire +2 more sources
Implementing RBAC model in An Operating System Kernel [PDF]
In this paper, the implementation of an operating system oriented RBAC model is discussed. Firstly, on the basis of RBAC96 model, a new RBAC model named OSR is presented. Secondly, the OSR model is enforced in RFSOS kernel by the way of integrating GFAC method and Capability mechanism together.
arxiv
The paper introduces the use of dynamic condition response (DCR) Graphs for role‐based and declarative access control in smart contracts. This approach enhances the security and adaptability of smart contracts by enabling dynamic role adjustments and visualizing access control rights.
Yibin Xu+4 more
wiley +1 more source
Keywords Extraction Technology for Few‐Shot Learning in Customer Service
Our study presents a model named synonym and dialogue sequence (S&DS) that employs synonym replacement and text dimensionality reduction using a pre‐trained BERT model, followed by keyword extraction based on a BiLSTM‐CRF neural network. ABSTRACT Customer service primarily involves interaction with clients through phone calls.
Xiaol Ma+4 more
wiley +1 more source
Flexible and Manageable Delegation of Authority in RBAC [PDF]
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for advanced access control. Flexibility and manageability are important requirements for any delegation system which is one of the most important access control management ...
David W. Chadwick+3 more
openaire +3 more sources
Abstract This systematic literature review examines the implementation and analysis of zk‐SNARK, zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in privacy‐preserving applications across diverse sectors. Examining 41 research works obtained through the systematic search queries and filtering criteria published from 2015
Bjorn Oude Roelink+2 more
wiley +1 more source
Expressing Privacy Preferences in terms of Invasiveness [PDF]
Dynamic context aware systems need highly flexible privacy protection mechanisms. We describe an extension to an existing RBAC-based mechanism that utilises a dynamic measure of invasiveness to determine whether contextual information should be ...
Osbakk, Patrik, Ryan, Nick S.
core