Results 11 to 20 of about 13,774 (222)
Implementing RBAC Policies [PDF]
We show how role-based access control (RBAC) and temporal RBAC (TRBAC) policies may be formally represented and translated into PL/SQL code to implement practical access control policies to protect Oracle SQL databases. Performance results for an implementation of a TRBAC policy in PL/SQL are presented.
Steve Barker +2 more
openalex +3 more sources
V-Model Role Engineering [PDF]
The paper focuses on role engineering which is an important topic in the development of access control system, particularly when considering Role Based Access Control – RBAC models.
Radu CONSTANTINESCU
doaj +2 more sources
Architecture for Enhancing Communication Security with RBAC IoT Protocol-Based Microgrids. [PDF]
Shin S, Park M, Kim T, Yang H.
europepmc +3 more sources
Charles E. Youman
openalex +2 more sources
Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software [PDF]
Purpose – This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong ...
Joe Garcia +5 more
doaj +1 more source
Continuous Production of Influenza VLPs Using IC-BEVS and Multi-Stage Bioreactors. [PDF]
ABSTRACT The insect cell‐baculovirus expression vector system (IC‐BEVS) has been an asset to produce biologics for over 30 years. With the current trend in biotechnology shifting toward process intensification and integration, developing intensified processes such as continuous production is crucial to hold this platform as a suitable alternative to ...
Correia R +7 more
europepmc +2 more sources
Role recommender-RBAC: Optimizing user-role assignments in RBAC [PDF]
In a rapidly changing IT environment, access to the resources involved in various projects might change randomly based on the role-based access control (RBAC) system. Hence, the security administrator needs to dynamically maintain the role assignments to users for optimizing user-role assignments.
Rao, K. R. +4 more
openaire +2 more sources
Rice bran arabinoxylan compound (RBAC) is derived from defatted rice bran hydrolyzed with Lentinus edodes mycelial enzyme. It has been marketed as a functional food and a nutraceutical with health-promoting properties. Some research has demonstrated this
Soo Liang Ooi +6 more
doaj +1 more source
Role-based Access Control (RBAC) session control is used in the authorization vetting of controlled objects within the system to check if a user intended action is permitted by the associated roles that he/she possesses.
Marcelo Antonio de Carvalho Junior +1 more
doaj +1 more source

