Results 101 to 110 of about 13,774 (222)

ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments

open access: yes, 2013
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of ...
Asghar, Muhammad Rizwan   +3 more
core  

A Study on zk-SNARK-Based RBAC Scheme in a Cross-Domain Cloud Environment

open access: yesApplied Sciences
Because of the advancement of IT, cross-domain environments have emerged where independent clouds with different security policies share data. However, sharing data between clouds with heterogeneous security levels is a challenging task, and most ...
Seong Cheol Yoon   +3 more
doaj   +1 more source

Poster Sessions

open access: yes
HemaSphere, Volume 9, Issue S1, June 2025.
wiley   +1 more source

Conditioned secure access control model based on multi-weighted roles and rules in workflow system

open access: yesTongxin xuebao, 2008
The traditional RBAC model cannot express complicated workflow secure access control constraint, so a new conditioned RBAC model suit for WfMS (workflow management system)—CMWRRBSAC (conditioned multi-weighted role and rule based secure access control ...
doaj   +2 more sources

Enhancing Network Security in Mobile Applications with Role-Based Access Control

open access: yesJournal of Information Systems and Informatics
In today's dynamic networking environment, securing access to resources has become increasingly challenging due to the growth and progress of connected devices.
Ezichi Mpamugo, Godwin Ansa
doaj   +1 more source

Home - About - Disclaimer - Privacy