Results 111 to 120 of about 12,389 (249)

Role-Mining Optimization with Separation-of-Duty Constraints and Security Detections for Authorizations

open access: yesFuture Internet, 2019
Role-based access control (RBAC), which has been regarded as one of the most popular access-control mechanisms, is featured by the separation-of-duty constraints, mutually exclusive constraints, and the least-privileges principle.
Wei Sun   +3 more
doaj   +1 more source

Lattice‐Based CP‐ABE Access Control for SDS Constraint with Lazy Assignment of Attributes and Attribute Revocation

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Ciphertext‐policy attribute‐based encryption (CP‐ABE) is a cryptographic scheme suitable for secure data sharing on cloud storage. The CP‐ABE based on lattice theory has the property of resisting quantum attack. Some data objects uploaded to the cloud by the same data owner may cause conflicts of interest, or their combination may expose sensitive ...
Ting Guo   +3 more
wiley   +1 more source

Compressive strength and elastic modulus of RBAC: An analysis of existing data and an artificial intelligence based prediction

open access: yesCase Studies in Construction Materials, 2023
In recent years crushing waste brick to produce recycled brick aggregates (RBAs) has become a viable solution for reducing environmental pollution and addressing the natural resource shortage in civil engineering.
Lang Lin   +3 more
doaj  

Secure Sharing of Electronic Medical Records Based on Blockchain

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2024, Issue 1, 2024.
As network technology advances and more people use devices, data storage has become a significant challenge due to the explosive growth of information and the threat of data leaks. In traditional medical institutions, most medical data is stored centrally through cloud computing technology in the institution’s data center.
Song Luo   +4 more
wiley   +1 more source

Role Mining with Probabilistic Models [PDF]

open access: yesarXiv, 2012
Role mining tackles the problem of finding a role-based access control (RBAC) configuration, given an access-control matrix assigning users to access permissions as input. Most role mining approaches work by constructing a large set of candidate roles and use a greedy selection strategy to iteratively pick a small subset such that the differences ...
arxiv  

A Privacy Preserving Framework for RFID Based Healthcare Systems [PDF]

open access: yes, 2017
RFID (Radio Frequency IDentification) is anticipated to be a core technology that will be used in many practical applications of our life in near future. It has received considerable attention within the healthcare for almost a decade now. The technology’
Ahamed, Sheikh Iqbal   +2 more
core   +1 more source

Task-role-based Access Control Model in Smart Health-care System

open access: yesMATEC Web of Conferences, 2015
As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue ...
Wang Peng, Jiang Lingyun
doaj   +1 more source

Research on the design and application of role-resource based access control model

open access: yesTongxin xuebao
The traditional role-based access control (RBAC) model plays a crucial role in permission management but faces challenges in Web applications, such as lack of resource definition, permission explosion, and permission leakage.
LAI Tianping   +3 more
doaj  

Geomagnetic effects on cosmic ray propagation under different conditions for Buenos Aires and Marambio, Argentina [PDF]

open access: yes, 2014
The geomagnetic field (Bgeo) sets a lower cutoff rigidity (Rc) to the entry of cosmic particles to Earth which depends on the geomagnetic activity. From numerical simulations of the trajectory of a proton using different models for Bgeo (performed with ...
Dasso, Sergio, Masías-Meza, Jimmy J.
core   +1 more source

Access Control for Hierarchical Joint-Tenancy [PDF]

open access: yesWSEAS Transactions on Computers, June 2006, Issue 6, Volume 5, p. 1313-1318, 2006
Basic role based access control [RBAC] provides a mechanism for segregating access privileges based upon a user's hierarchical roles within an organization. This model doesn't scale well when there is tight integration of multiple hierarchies. In a case where there is joint-tenancy and a requirement for different levels of disclosure based upon a user ...
arxiv  

Home - About - Disclaimer - Privacy