Results 131 to 140 of about 12,389 (249)
An Activity-Based Model for Separation of Duty [PDF]
This paper offers several contributions for separation of duty (SoD) administration in role-based access control (RBAC) systems. We first introduce a new formal framework, based on business perspective, where SoD constraints are analyzed introducing the activity concept.
arxiv
Protecting federated databases using a practical implementation of a formal RBAC policy [PDF]
Suzie Barker, P. Douglas
openalex +1 more source
Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC (Extended Version) [PDF]
We formalize automated analysis techniques for the validation of web services specified in BPEL and a RBAC variant tailored to BPEL. The idea is to use decidable fragments of first-order logic to describe the state space of a certain class of web services and then use state-of-the-art SMT solvers to handle their reachability problems.
arxiv
Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization.
arxiv
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy [PDF]
Yue Zhang, James Joshi
openalex +1 more source
RBAC Architecture Design Issues in Institutions Collaborative Environment [PDF]
Institutional collaborative systems focus on providing the fast, and secure connections to students, teaching and non-teaching staff members. Access control is more important in these types of systems because different kind of users access the system on different levels.
arxiv
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems [PDF]
Maria Luisa Damiani+2 more
openalex +1 more source
Lambda-RBAC: Programming with Role-Based Access Control [PDF]
Radha Jagadeesan+3 more
openalex +1 more source
Owner-Based Role-Based Access Control OB-RBAC [PDF]
Mohsen Saffarian, Babak Sadighi
openalex +1 more source
Enhancing Network Security in Mobile Applications with Role-Based Access Control
In today's dynamic networking environment, securing access to resources has become increasingly challenging due to the growth and progress of connected devices.
Ezichi Mpamugo, Godwin Ansa
doaj +1 more source