Results 221 to 230 of about 12,389 (249)

A data management system for precision medicine. [PDF]

open access: yesPLOS Digit Health
Jacobs JJL   +22 more
europepmc   +1 more source

Integrating Blockchain, SSI, and RBAC for the Secure Management of Defence Heritage Buildings

open access: gold
Gavina Baralla   +3 more
openalex   +1 more source

A Graph-based Framework for ABAC Policy Enforcement and Analysis. [PDF]

open access: yesData Appl Secur Priv XXXII (2024)
Yang M, Atluri V, Sural S, Vaidya J.
europepmc   +1 more source

Ts-RBAC: A RBAC model with transformation

Computers & Security, 2016
The traditional role-based access control (RBAC) model is typically static, i.e., permissions are granted based on a policy that seldom changes. A more flexible support for access control is needed in certain scenarios (such as disaster management). The break the glass RBAC (BTG-RBAC) model is an RBAC model with the break-glass technique, which enables
Gang Liu   +5 more
openaire   +2 more sources

RBAC-MAS and SODA: Experimenting RBAC in AOSE

2009
Role-Based Access Control models are currently considered as the most effective approach for engineering access control systems. In this paper we experiment their application in the context of Multi-Agent Systems (MAS), by discussing the design of an access control system with an agent-oriented methodology such as SODA.
MOLESINI, AMBRA   +2 more
openaire   +3 more sources

AT-RBAC: An Authentication Trustworthiness-Based RBAC Model

2004
In current operating systems, the strength of authentication mechanism does not work on the authorization of the user, which leaves the system security compromise that the user who has passed weak authentication mechanism may have many access rights. This paper firstly puts forwards the thought of authentication trustworthiness, the aim is to give each
Xiangke Liao   +3 more
openaire   +2 more sources

Administration of an RBAC system

37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, 2004
Recently RBAC (role-based access controls) was found to be among the most attractive solutions for providing access control in Web-based e-commerce and e-government applications. Usually, such systems involve a huge number of heterogeneous users working with the systems under different rights and obligations. In an RBAC authorization and access control
Björn Muschall   +2 more
openaire   +2 more sources

CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time

2007 IEEE International Performance, Computing, and Communications Conference, 2007
Many emerging applications show the need for a fine-grained context based access control requirements. The generalized temporal RBAC model has been proposed to capture fine-grained time-based access control requirements using periodic time expression to capture recurring intervals of time.
James Joshi, Kai Ouyang
openaire   +2 more sources

Home - About - Disclaimer - Privacy