Results 91 to 100 of about 13,774 (222)

RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies

open access: yesProceedings of the 11th International Conference on Security and Cryptography, 2014
Role-based access control (RBAC) is the de facto access control model used in current information systems. Cryptographic access control (CAC), on the other hand, is an implementation paradigm intended to enforce AC-policies cryptographically. CAC-methods are also attractive in cloud environments due to their distributed and offline nature of operation.
openaire   +1 more source

Trust-Aware RBAC

open access: yes, 2012
In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes trustworthiness of users into consideration explicitly before granting access. We assume that each role in the framework is associated with an expression that describe trustworthiness of subjects required to be able to activate the role, and each subject (user) has assigned
openaire   +2 more sources

Role-Mining Optimization with Separation-of-Duty Constraints and Security Detections for Authorizations

open access: yesFuture Internet, 2019
Role-based access control (RBAC), which has been regarded as one of the most popular access-control mechanisms, is featured by the separation-of-duty constraints, mutually exclusive constraints, and the least-privileges principle.
Wei Sun   +3 more
doaj   +1 more source

Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service

open access: yes, 2016
Database as a service provides services for accessing and managing customers data which provides ease of access, and the cost is less for these services. There is a possibility that the DBaaS service provider may not be trusted, and data may be stored on
E Bertino   +3 more
core   +1 more source

PEP4Django - A Policy Enforcement Point for Python Web Applications [PDF]

open access: yes, 2019
Traditionally, access control mechanisms have been hard-coded into application components. Such approach is error-prone, mixing business logic with access control concerns, and affecting the flexibility of security policies, as is the case with IFRN ...
Da Silva, Carlos   +2 more
core  

Research on the design and application of role-resource based access control model

open access: yesTongxin xuebao
The traditional role-based access control (RBAC) model plays a crucial role in permission management but faces challenges in Web applications, such as lack of resource definition, permission explosion, and permission leakage.
LAI Tianping   +3 more
doaj  

Policy analysis for self-administrated role-based access control

open access: yes, 2013
Current techniques for security analysis of administrative role-based access control (ARBAC) policies restrict themselves to the separate administration assumption that essentially separates administrative roles from regular ones.
Ferrara, Anna Lisa   +2 more
core  

Task-role-based Access Control Model in Smart Health-care System

open access: yesMATEC Web of Conferences, 2015
As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue ...
Wang Peng, Jiang Lingyun
doaj   +1 more source

The Golgi apparatus is a primary site of intracellular damage after photosensitization with Rose Bengal acetate

open access: yesEuropean Journal of Histochemistry, 2009
The aim of the present investigation was to elucidate whether the Golgi apparatus undergoes photodamage following administration of the fluorogenic substrates Rose Bengal acetate (RBAc) and irradiation at the appropriate wavelength. Human HeLa cells were
C Soldani   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy