Results 191 to 200 of about 13,774 (222)
Privacy preservation in blockchain-based healthcare data sharing: A systematic review. [PDF]
Li K, Lohachab A, Dumontier M, Urovi V.
europepmc +1 more source
A blockchain secured metaverse framework for scalable and immersive telemedicine. [PDF]
Sonkamble RG +5 more
europepmc +1 more source
SIREN : a SQL-based implementation of role-based access control (RBAC) for enterprise networks
Arundhati Singh
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
RBAC-MAS and SODA: Experimenting RBAC in AOSE
2009Role-Based Access Control models are currently considered as the most effective approach for engineering access control systems. In this paper we experiment their application in the context of Multi-Agent Systems (MAS), by discussing the design of an access control system with an agent-oriented methodology such as SODA.
MOLESINI, AMBRA +2 more
openaire +2 more sources
AT-RBAC: An Authentication Trustworthiness-Based RBAC Model
2004In current operating systems, the strength of authentication mechanism does not work on the authorization of the user, which leaves the system security compromise that the user who has passed weak authentication mechanism may have many access rights. This paper firstly puts forwards the thought of authentication trustworthiness, the aim is to give each
Lunwei Wang +3 more
openaire +1 more source
Deploying ABAC policies using RBAC systems [PDF]
The flexibility, portability and identity-less access control features of Attribute Based Access Control (ABAC) make it an attractive choice to be employed in many application domains. However, commercially viable methods for implementation of ABAC do not exist while a vast majority of organizations use Role Based Access Control (RBAC) or their ...
Gunjan, Batra +3 more
openaire +2 more sources
2007
This paper focuses on recommending the usage of the Role-Based Access Control (RBAC) model to define the users’ security roles, permissions, authorization, and role hierarchy to access the SCADA system. Achieving the desired level of authorization and access control will involve integrating the secur ity system with SCADA operations and building role ...
M. Majdalawieh +2 more
openaire +2 more sources
This paper focuses on recommending the usage of the Role-Based Access Control (RBAC) model to define the users’ security roles, permissions, authorization, and role hierarchy to access the SCADA system. Achieving the desired level of authorization and access control will involve integrating the secur ity system with SCADA operations and building role ...
M. Majdalawieh +2 more
openaire +2 more sources
CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time
2007 IEEE International Performance, Computing, and Communications Conference, 2007Many emerging applications show the need for a fine-grained context based access control requirements. The generalized temporal RBAC model has been proposed to capture fine-grained time-based access control requirements using periodic time expression to capture recurring intervals of time.
Kai Ouyang, James B. D. Joshi
openaire +1 more source
RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies, 2010In a clear contrast with the phenomenal growth of Web database applications, access control issues related to data stored in the back-end databases have largely been neglected. Current approaches to access control on databases do not fit web databases because they are mostly based on individual user identities.
Ahlem Bouchahda +3 more
openaire +1 more source
LoT-RBAC: A Location and Time-Based RBAC Model
2005Recent growth in location-based mobile services has introduced a significant need for location and time-based access control to resources. High mobility of the users and services in the emerging mobile applications in particular make the issue of controlling who can access what information and resources from which locations a daunting challenge ...
Suroop Mohan Chandran, J. B. D. Joshi
openaire +1 more source

