Results 201 to 210 of about 13,774 (222)
Some of the next articles are maybe not open access.
Taming role mining complexity in RBAC
Computers & Security, 2010In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to roles; second, we identify user-permission assignments that cannot belong to roles with a weight exceeding a given threshold; and third, we restrict the role-finding problem to ...
COLANTONIO A +3 more
openaire +2 more sources
SC-RBAC: A Smart Contract based RBAC Model for DApps
2019Blockchain technology with its non-centralized, transparent, trustful, traceable and tamper-resistant features draws more and more attention both in commercial and scientific area. Smart contracts and DApps (Decentralized Applications) are programs naturally running automatically on blockchain. Access control is a principle that regulates the access to
Yi Ding +4 more
openaire +1 more source
2012
Role Based Access Control (RBAC) has received considerable attention as a model of choice for simplified access control over the past decade. More recently, risk awareness in access control has emerged as an important research theme to mitigate risks involved when users exercise their privileges to access resources under different contexts such as ...
Khalid Zaman Bijon +2 more
openaire +1 more source
Role Based Access Control (RBAC) has received considerable attention as a model of choice for simplified access control over the past decade. More recently, risk awareness in access control has emerged as an important research theme to mitigate risks involved when users exercise their privileges to access resources under different contexts such as ...
Khalid Zaman Bijon +2 more
openaire +1 more source
Ts-RBAC: A RBAC model with transformation
Computers & Security, 2016Gang Liu +5 more
openaire +1 more source

