Results 101 to 110 of about 13,774 (222)
ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of ...
Asghar, Muhammad Rizwan +3 more
core
An Elliptic Curve Cryptosystem based on Trust and RBAC to Reduce Security Overhead in Sensor Networks [PDF]
Hyojin Kim, Ho Hyun Park
openalex +1 more source
A Study on Design for Efficient Personal Policy of Service based RBAC [PDF]
Hyung-Jin Mun, Kun-Hee Han
openalex +1 more source
A Study on zk-SNARK-Based RBAC Scheme in a Cross-Domain Cloud Environment
Because of the advancement of IT, cross-domain environments have emerged where independent clouds with different security policies share data. However, sharing data between clouds with heterogeneous security levels is a challenging task, and most ...
Seong Cheol Yoon +3 more
doaj +1 more source
Context-Aware Dynamic RBAC Model for Application Layer Multicast [PDF]
FuJian Zhong, Yujiao Liu
openalex +1 more source
Conditioned secure access control model based on multi-weighted roles and rules in workflow system
The traditional RBAC model cannot express complicated workflow secure access control constraint, so a new conditioned RBAC model suit for WfMS (workflow management system)—CMWRRBSAC (conditioned multi-weighted role and rule based secure access control ...
doaj +2 more sources
Enhancing Network Security in Mobile Applications with Role-Based Access Control
In today's dynamic networking environment, securing access to resources has become increasingly challenging due to the growth and progress of connected devices.
Ezichi Mpamugo, Godwin Ansa
doaj +1 more source
A Cross-Tenant RBAC Model for Collaborative Cloud Services
Zhengtao Liu, Jinyue Xia
openalex +1 more source

