Results 11 to 20 of about 12,389 (249)
Analysis of ANSI RBAC Support in EJB [PDF]
This paper analyzes access control mechanisms of the Enterprise Java Beans (EJB) architecture and defines a configuration of the EJB protection system in a more precise and less ambiguous language than the EJB 3.0 standard. Using this configuration, the authors suggest an algorithm that formally specifies the semantics of authorization decisions in EJB.
Wesam Darwish, Konstantin Beznosov
openalex +4 more sources
On the use of Max-SAT and PDDL in RBAC maintenance [PDF]
Role-Based Access Control (RBAC) policies are at the core of Cybersecurity as they ease the enforcement of basic security principles, e.g., Least Privilege and Separation of Duties.
Marco Benedetti, Marco Mori
doaj +2 more sources
ESPOON$_{ERBAC}$: Enforcing Security Policies In Outsourced Environments [PDF]
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of service than in-house solutions.
Asghar, Muhammad Rizwan+3 more
arxiv +2 more sources
Automated Verification Of Role-Based Access Control Policies Constraints Using Prover9 [PDF]
Access control policies are used to restrict access to sensitive records for authorized users only. One approach for specifying policies is using role based access control (RBAC) where authorization is given to roles instead of users. Users are assigned to roles such that each user can access all the records that are allowed to his/her role. RBAC has a
Sabri, Khair Eddin
arxiv +3 more sources
Research on the multi-granularity method of role engineering [PDF]
The role-based access control model (RBAC) is an access control approach oriented to enterprise security policy, which plays a leading role in the field of access control due to its good applicability and flexibility.
Yongmei Jiao+3 more
doaj +2 more sources
Towards user-oriented RBAC model [PDF]
Role mining is to define a role set to implement the role-based access control (RBAC) system and regarded as one of the most important and costliest implementation phases. While various role mining models have been proposed, we find that user experience/perception – one ultimate goal for any information system – is surprisingly ignored by the existing
Haibing Lu+4 more
openalex +7 more sources
V-Model Role Engineering [PDF]
The paper focuses on role engineering which is an important topic in the development of access control system, particularly when considering Role Based Access Control – RBAC models.
Radu CONSTANTINESCU
doaj +2 more sources
Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software [PDF]
Purpose – This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong ...
Joe Garcia+5 more
doaj +1 more source
Role recommender-RBAC: Optimizing user-role assignments in RBAC [PDF]
In a rapidly changing IT environment, access to the resources involved in various projects might change randomly based on the role-based access control (RBAC) system. Hence, the security administrator needs to dynamically maintain the role assignments to users for optimizing user-role assignments.
Ashalatha Nayak+5 more
openaire +2 more sources
Securing access to data in location-based services and mobile applications requires the definition of spatially aware access-control systems. Even if some approaches have already been proposed either in the context of geographic database systems or context-aware applications, a comprehensive framework, general and flexible enough to deal with spatial ...
M.L. Damiani+3 more
openaire +5 more sources