Results 91 to 100 of about 12,389 (249)

Towards Integrated Modelling of Dynamic Access Control with UML and Event-B [PDF]

open access: yesEPTCS 271, 2018, pp. 105-116, 2018
Role-Based Access Control (RBAC) is a popular authorization model used to manage data-access constraints in a wide range of systems. RBAC usually defines the static view on the access rights. However, to ensure dependability of a system, it is often necessary to model and verify state-dependent access rights.
arxiv   +1 more source

DemocracyGuard: Blockchain‐based secure voting framework for digital democracy

open access: yesExpert Systems, Volume 42, Issue 2, February 2025.
Abstract Online voting is gaining traction in contemporary society to reduce costs and boost voter turnout, allowing individuals to cast their ballots from anywhere with an internet connection. This innovation is cautiously met due to the inherent security risks, where a single vulnerability can lead to widespread vote manipulation.
Mritunjay Shall Peelam   +3 more
wiley   +1 more source

Migrating from DAC to RBAC [PDF]

open access: yes, 2015
Role Based Access Control (RBAC) is one of the most popular means for enforcing access control. One of the main reasons for this is that it is perceived as the least expensive configuration with respect to security administration. In this paper, we demonstrate that security administration is not always cheaper under RBAC when compared to the ...
David Lorenzi   +4 more
openaire   +3 more sources

Authorization recycling in hierarchical RBAC systems [PDF]

open access: yesACM Transactions on Information and System Security, 2011
As distributed applications increase in size and complexity, traditional authorization architectures based on a dedicated authorization server become increasingly fragile because this decision point represents a single point of failure and a performance bottleneck.
Jason Crampton   +3 more
openaire   +2 more sources

Implementing RBAC model in An Operating System Kernel [PDF]

open access: yesarXiv, 2016
In this paper, the implementation of an operating system oriented RBAC model is discussed. Firstly, on the basis of RBAC96 model, a new RBAC model named OSR is presented. Secondly, the OSR model is enforced in RFSOS kernel by the way of integrating GFAC method and Capability mechanism together.
arxiv  

Safe design and evolution of smart contracts using dynamic condition response graphs to model generic role‐based behaviors

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 1, January 2025.
The paper introduces the use of dynamic condition response (DCR) Graphs for role‐based and declarative access control in smart contracts. This approach enhances the security and adaptability of smart contracts by enabling dynamic role adjustments and visualizing access control rights.
Yibin Xu   +4 more
wiley   +1 more source

Keywords Extraction Technology for Few‐Shot Learning in Customer Service

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Our study presents a model named synonym and dialogue sequence (S&DS) that employs synonym replacement and text dimensionality reduction using a pre‐trained BERT model, followed by keyword extraction based on a BiLSTM‐CRF neural network. ABSTRACT Customer service primarily involves interaction with clients through phone calls.
Xiaol Ma   +4 more
wiley   +1 more source

Flexible and Manageable Delegation of Authority in RBAC [PDF]

open access: yes21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), 2007
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for advanced access control. Flexibility and manageability are important requirements for any delegation system which is one of the most important access control management ...
David W. Chadwick   +3 more
openaire   +3 more sources

Systematic review: Comparing zk‐SNARK, zk‐STARK, and bulletproof protocols for privacy‐preserving authentication

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 5, September/October 2024.
Abstract This systematic literature review examines the implementation and analysis of zk‐SNARK, zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in privacy‐preserving applications across diverse sectors. Examining 41 research works obtained through the systematic search queries and filtering criteria published from 2015
Bjorn Oude Roelink   +2 more
wiley   +1 more source

Expressing Privacy Preferences in terms of Invasiveness [PDF]

open access: yes, 2004
Dynamic context aware systems need highly flexible privacy protection mechanisms. We describe an extension to an existing RBAC-based mechanism that utilises a dynamic measure of invasiveness to determine whether contextual information should be ...
Osbakk, Patrik, Ryan, Nick S.
core  

Home - About - Disclaimer - Privacy