Results 191 to 200 of about 13,774 (222)

A blockchain secured metaverse framework for scalable and immersive telemedicine. [PDF]

open access: yesSci Rep
Sonkamble RG   +5 more
europepmc   +1 more source

RBAC-MAS and SODA: Experimenting RBAC in AOSE

2009
Role-Based Access Control models are currently considered as the most effective approach for engineering access control systems. In this paper we experiment their application in the context of Multi-Agent Systems (MAS), by discussing the design of an access control system with an agent-oriented methodology such as SODA.
MOLESINI, AMBRA   +2 more
openaire   +2 more sources

AT-RBAC: An Authentication Trustworthiness-Based RBAC Model

2004
In current operating systems, the strength of authentication mechanism does not work on the authorization of the user, which leaves the system security compromise that the user who has passed weak authentication mechanism may have many access rights. This paper firstly puts forwards the thought of authentication trustworthiness, the aim is to give each
Lunwei Wang   +3 more
openaire   +1 more source

Deploying ABAC policies using RBAC systems [PDF]

open access: possibleJournal of Computer Security, 2019
The flexibility, portability and identity-less access control features of Attribute Based Access Control (ABAC) make it an attractive choice to be employed in many application domains. However, commercially viable methods for implementation of ABAC do not exist while a vast majority of organizations use Role Based Access Control (RBAC) or their ...
Gunjan, Batra   +3 more
openaire   +2 more sources

RBAC Model for SCADA

2007
This paper focuses on recommending the usage of the Role-Based Access Control (RBAC) model to define the users’ security roles, permissions, authorization, and role hierarchy to access the SCADA system. Achieving the desired level of authorization and access control will involve integrating the secur ity system with SCADA operations and building role ...
M. Majdalawieh   +2 more
openaire   +2 more sources

CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time

2007 IEEE International Performance, Computing, and Communications Conference, 2007
Many emerging applications show the need for a fine-grained context based access control requirements. The generalized temporal RBAC model has been proposed to capture fine-grained time-based access control requirements using periodic time expression to capture recurring intervals of time.
Kai Ouyang, James B. D. Joshi
openaire   +1 more source

RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases

2010 Fourth International Conference on Emerging Security Information, Systems and Technologies, 2010
In a clear contrast with the phenomenal growth of Web database applications, access control issues related to data stored in the back-end databases have largely been neglected. Current approaches to access control on databases do not fit web databases because they are mostly based on individual user identities.
Ahlem Bouchahda   +3 more
openaire   +1 more source

LoT-RBAC: A Location and Time-Based RBAC Model

2005
Recent growth in location-based mobile services has introduced a significant need for location and time-based access control to resources. High mobility of the users and services in the emerging mobile applications in particular make the issue of controlling who can access what information and resources from which locations a daunting challenge ...
Suroop Mohan Chandran, J. B. D. Joshi
openaire   +1 more source

Home - About - Disclaimer - Privacy