Results 221 to 230 of about 12,389 (249)
A data management system for precision medicine. [PDF]
Jacobs JJL+22 more
europepmc +1 more source
Integrating Blockchain, SSI, and RBAC for the Secure Management of Defence Heritage Buildings
Gavina Baralla+3 more
openalex +1 more source
A Graph-based Framework for ABAC Policy Enforcement and Analysis. [PDF]
Yang M, Atluri V, Sural S, Vaidya J.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Ts-RBAC: A RBAC model with transformation
Computers & Security, 2016The traditional role-based access control (RBAC) model is typically static, i.e., permissions are granted based on a policy that seldom changes. A more flexible support for access control is needed in certain scenarios (such as disaster management). The break the glass RBAC (BTG-RBAC) model is an RBAC model with the break-glass technique, which enables
Gang Liu+5 more
openaire +2 more sources
RBAC-MAS and SODA: Experimenting RBAC in AOSE
2009Role-Based Access Control models are currently considered as the most effective approach for engineering access control systems. In this paper we experiment their application in the context of Multi-Agent Systems (MAS), by discussing the design of an access control system with an agent-oriented methodology such as SODA.
MOLESINI, AMBRA+2 more
openaire +3 more sources
AT-RBAC: An Authentication Trustworthiness-Based RBAC Model
2004In current operating systems, the strength of authentication mechanism does not work on the authorization of the user, which leaves the system security compromise that the user who has passed weak authentication mechanism may have many access rights. This paper firstly puts forwards the thought of authentication trustworthiness, the aim is to give each
Xiangke Liao+3 more
openaire +2 more sources
Administration of an RBAC system
37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, 2004Recently RBAC (role-based access controls) was found to be among the most attractive solutions for providing access control in Web-based e-commerce and e-government applications. Usually, such systems involve a huge number of heterogeneous users working with the systems under different rights and obligations. In an RBAC authorization and access control
Björn Muschall+2 more
openaire +2 more sources
CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time
2007 IEEE International Performance, Computing, and Communications Conference, 2007Many emerging applications show the need for a fine-grained context based access control requirements. The generalized temporal RBAC model has been proposed to capture fine-grained time-based access control requirements using periodic time expression to capture recurring intervals of time.
James Joshi, Kai Ouyang
openaire +2 more sources