Results 11 to 20 of about 13,774 (222)

Implementing RBAC Policies [PDF]

open access: bronze, 2003
We show how role-based access control (RBAC) and temporal RBAC (TRBAC) policies may be formally represented and translated into PL/SQL code to implement practical access control policies to protect Oracle SQL databases. Performance results for an implementation of a TRBAC policy in PL/SQL are presented.
Steve Barker   +2 more
openalex   +3 more sources

V-Model Role Engineering [PDF]

open access: yesInformatică economică, 2009
The paper focuses on role engineering which is an important topic in the development of access control system, particularly when considering Role Based Access Control – RBAC models.
Radu CONSTANTINESCU
doaj   +2 more sources

RBAC transition [PDF]

open access: goldProceedings of the first ACM Workshop on Role-based access control - RBAC '95, 1996
Charles E. Youman
openalex   +2 more sources

Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software [PDF]

open access: yesJournal of Defense Analytics and Logistics, 2021
Purpose – This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong ...
Joe Garcia   +5 more
doaj   +1 more source

Continuous Production of Influenza VLPs Using IC-BEVS and Multi-Stage Bioreactors. [PDF]

open access: yesBiotechnol Bioeng
ABSTRACT The insect cell‐baculovirus expression vector system (IC‐BEVS) has been an asset to produce biologics for over 30 years. With the current trend in biotechnology shifting toward process intensification and integration, developing intensified processes such as continuous production is crucial to hold this platform as a suitable alternative to ...
Correia R   +7 more
europepmc   +2 more sources

Role recommender-RBAC: Optimizing user-role assignments in RBAC [PDF]

open access: yesComputer Communications, 2021
In a rapidly changing IT environment, access to the resources involved in various projects might change randomly based on the role-based access control (RBAC) system. Hence, the security administrator needs to dynamically maintain the role assignments to users for optimizing user-role assignments.
Rao, K. R.   +4 more
openaire   +2 more sources

The Health-Promoting Properties and Clinical Applications of Rice Bran Arabinoxylan Modified with Shiitake Mushroom Enzyme—A Narrative Review

open access: yesMolecules, 2021
Rice bran arabinoxylan compound (RBAC) is derived from defatted rice bran hydrolyzed with Lentinus edodes mycelial enzyme. It has been marketed as a functional food and a nutraceutical with health-promoting properties. Some research has demonstrated this
Soo Liang Ooi   +6 more
doaj   +1 more source

Implications of loosened Role-based Access Control session control implementation for the enforcement of Dynamic Mutually Exclusive Roles properties on Health Information Systems

open access: yesInformatics in Medicine Unlocked, 2021
Role-based Access Control (RBAC) session control is used in the authorization vetting of controlled objects within the system to check if a user intended action is permitted by the associated roles that he/she possesses.
Marcelo Antonio de Carvalho Junior   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy