Results 111 to 120 of about 12,389 (249)
Role-based access control (RBAC), which has been regarded as one of the most popular access-control mechanisms, is featured by the separation-of-duty constraints, mutually exclusive constraints, and the least-privileges principle.
Wei Sun+3 more
doaj +1 more source
Ciphertext‐policy attribute‐based encryption (CP‐ABE) is a cryptographic scheme suitable for secure data sharing on cloud storage. The CP‐ABE based on lattice theory has the property of resisting quantum attack. Some data objects uploaded to the cloud by the same data owner may cause conflicts of interest, or their combination may expose sensitive ...
Ting Guo+3 more
wiley +1 more source
In recent years crushing waste brick to produce recycled brick aggregates (RBAs) has become a viable solution for reducing environmental pollution and addressing the natural resource shortage in civil engineering.
Lang Lin+3 more
doaj
Secure Sharing of Electronic Medical Records Based on Blockchain
As network technology advances and more people use devices, data storage has become a significant challenge due to the explosive growth of information and the threat of data leaks. In traditional medical institutions, most medical data is stored centrally through cloud computing technology in the institution’s data center.
Song Luo+4 more
wiley +1 more source
Role Mining with Probabilistic Models [PDF]
Role mining tackles the problem of finding a role-based access control (RBAC) configuration, given an access-control matrix assigning users to access permissions as input. Most role mining approaches work by constructing a large set of candidate roles and use a greedy selection strategy to iteratively pick a small subset such that the differences ...
arxiv
A Privacy Preserving Framework for RFID Based Healthcare Systems [PDF]
RFID (Radio Frequency IDentification) is anticipated to be a core technology that will be used in many practical applications of our life in near future. It has received considerable attention within the healthcare for almost a decade now. The technology’
Ahamed, Sheikh Iqbal+2 more
core +1 more source
Task-role-based Access Control Model in Smart Health-care System
As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue ...
Wang Peng, Jiang Lingyun
doaj +1 more source
Research on the design and application of role-resource based access control model
The traditional role-based access control (RBAC) model plays a crucial role in permission management but faces challenges in Web applications, such as lack of resource definition, permission explosion, and permission leakage.
LAI Tianping+3 more
doaj
Geomagnetic effects on cosmic ray propagation under different conditions for Buenos Aires and Marambio, Argentina [PDF]
The geomagnetic field (Bgeo) sets a lower cutoff rigidity (Rc) to the entry of cosmic particles to Earth which depends on the geomagnetic activity. From numerical simulations of the trajectory of a proton using different models for Bgeo (performed with ...
Dasso, Sergio, Masías-Meza, Jimmy J.
core +1 more source
Access Control for Hierarchical Joint-Tenancy [PDF]
Basic role based access control [RBAC] provides a mechanism for segregating access privileges based upon a user's hierarchical roles within an organization. This model doesn't scale well when there is tight integration of multiple hierarchies. In a case where there is joint-tenancy and a requirement for different levels of disclosure based upon a user ...
arxiv