Results 131 to 140 of about 12,389 (249)

An Activity-Based Model for Separation of Duty [PDF]

open access: yesarXiv, 2008
This paper offers several contributions for separation of duty (SoD) administration in role-based access control (RBAC) systems. We first introduce a new formal framework, based on business perspective, where SoD constraints are analyzed introducing the activity concept.
arxiv  

Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC (Extended Version) [PDF]

open access: yesarXiv, 2010
We formalize automated analysis techniques for the validation of web services specified in BPEL and a RBAC variant tailored to BPEL. The idea is to use decidable fragments of first-order logic to describe the state space of a certain class of web services and then use state-of-the-art SMT solvers to handle their reachability problems.
arxiv  

Constrained Role Mining [PDF]

open access: yesarXiv, 2012
Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization.
arxiv  

RBAC Architecture Design Issues in Institutions Collaborative Environment [PDF]

open access: yesInternational Journal of Computer Science Issues, Volume 10, Issue 4, July 2013, 2013
Institutional collaborative systems focus on providing the fast, and secure connections to students, teaching and non-teaching staff members. Access control is more important in these types of systems because different kind of users access the system on different levels.
arxiv  

Lambda-RBAC: Programming with Role-Based Access Control [PDF]

open access: diamond, 2008
Radha Jagadeesan   +3 more
openalex   +1 more source

Enhancing Network Security in Mobile Applications with Role-Based Access Control

open access: yesJournal of Information Systems and Informatics
In today's dynamic networking environment, securing access to resources has become increasingly challenging due to the growth and progress of connected devices.
Ezichi Mpamugo, Godwin Ansa
doaj   +1 more source

Home - About - Disclaimer - Privacy