Results 91 to 100 of about 13,774 (222)
RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies
Role-based access control (RBAC) is the de facto access control model used in current information systems. Cryptographic access control (CAC), on the other hand, is an implementation paradigm intended to enforce AC-policies cryptographically. CAC-methods are also attractive in cloud environments due to their distributed and offline nature of operation.
openaire +1 more source
In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes trustworthiness of users into consideration explicitly before granting access. We assume that each role in the framework is associated with an expression that describe trustworthiness of subjects required to be able to activate the role, and each subject (user) has assigned
openaire +2 more sources
Role-based access control (RBAC), which has been regarded as one of the most popular access-control mechanisms, is featured by the separation-of-duty constraints, mutually exclusive constraints, and the least-privileges principle.
Wei Sun +3 more
doaj +1 more source
Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
Database as a service provides services for accessing and managing customers data which provides ease of access, and the cost is less for these services. There is a possibility that the DBaaS service provider may not be trusted, and data may be stored on
E Bertino +3 more
core +1 more source
PEP4Django - A Policy Enforcement Point for Python Web Applications [PDF]
Traditionally, access control mechanisms have been hard-coded into application components. Such approach is error-prone, mixing business logic with access control concerns, and affecting the flexibility of security policies, as is the case with IFRN ...
Da Silva, Carlos +2 more
core
Research on the design and application of role-resource based access control model
The traditional role-based access control (RBAC) model plays a crucial role in permission management but faces challenges in Web applications, such as lack of resource definition, permission explosion, and permission leakage.
LAI Tianping +3 more
doaj
Exact Boolean matrix factorization based on concept lattice factors and its application in RBAC [PDF]
Qiang Wu, Tao Wang, Liping Xie
openalex +1 more source
Policy analysis for self-administrated role-based access control
Current techniques for security analysis of administrative role-based access control (ARBAC) policies restrict themselves to the separate administration assumption that essentially separates administrative roles from regular ones.
Ferrara, Anna Lisa +2 more
core
Task-role-based Access Control Model in Smart Health-care System
As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue ...
Wang Peng, Jiang Lingyun
doaj +1 more source
The aim of the present investigation was to elucidate whether the Golgi apparatus undergoes photodamage following administration of the fluorogenic substrates Rose Bengal acetate (RBAc) and irradiation at the appropriate wavelength. Human HeLa cells were
C Soldani +5 more
doaj +1 more source

