Results 141 to 150 of about 12,389 (249)
Conditioned secure access control model based on multi-weighted roles and rules in workflow system
The traditional RBAC model cannot express complicated workflow secure access control constraint, so a new conditioned RBAC model suit for WfMS (workflow management system)—CMWRRBSAC (conditioned multi-weighted role and rule based secure access control ...
doaj +2 more sources
Role-based access control (RBAC) in Java via proxy objects using annotations [PDF]
Jeff Zarnett+2 more
openalex +1 more source
Policy analysis for self-administrated role-based access control
Current techniques for security analysis of administrative role-based access control (ARBAC) policies restrict themselves to the separate administration assumption that essentially separates administrative roles from regular ones.
Ferrara, Anna Lisa+2 more
core
Quantifying Azure RBAC Wildcard Overreach [PDF]
Azure RBAC leverages wildcard permissions to simplify policy authoring, but this abstraction often obscures the actual set of allowed operations and undermines least-privilege guarantees. We introduce Belshazaar, a two-stage framework that targets both the effective permission set problem and the evaluation of wildcards permissions spread.
arxiv
Privacy Model based on RBAC for U-Healthcare Service Environment [PDF]
Bong-Keun Rhee+2 more
openalex +1 more source
Spectral-clustering-based abnormal permission assignments hunting framework
Migrating traditional access control,such as mandatory and discretionary access control,into role-based access control(RBAC)lightens a practical way to improve the user-permission management efficiency.To guarantee the security of RBAC system,it is ...
Liang FANG+3 more
doaj +2 more sources
Schema Based XML Security: RBAC Approach
Xinwen Zhang, Jae-Hong Park, Ravi Sandhu
openalex +1 more source
Study on the Protective Immunity Induced by Pseudotyped Baculovirus Expressing the E Protein of Tembusu Virus in Ducklings. [PDF]
Ni Z+7 more
europepmc +1 more source