Results 231 to 240 of about 12,389 (249)
Some of the next articles are maybe not open access.
LoT-RBAC: A Location and Time-Based RBAC Model
2005Recent growth in location-based mobile services has introduced a significant need for location and time-based access control to resources. High mobility of the users and services in the emerging mobile applications in particular make the issue of controlling who can access what information and resources from which locations a daunting challenge ...
James Joshi, Suroop Mohan Chandran
openaire +2 more sources
Proceedings of the 18th ACM symposium on Access control models and technologies, 2013
Context-aware access control systems should reactively adapt access control decisions to dynamic environmental conditions. In this paper we present an extension of the TRBAC model that allows the specification and enforcement of general reactive policies.
BONATTI, PIERO ANDREA+2 more
openaire +4 more sources
Context-aware access control systems should reactively adapt access control decisions to dynamic environmental conditions. In this paper we present an extension of the TRBAC model that allows the specification and enforcement of general reactive policies.
BONATTI, PIERO ANDREA+2 more
openaire +4 more sources
2007
This paper focuses on recommending the usage of the Role-Based Access Control (RBAC) model to define the users’ security roles, permissions, authorization, and role hierarchy to access the SCADA system. Achieving the desired level of authorization and access control will involve integrating the secur ity system with SCADA operations and building role ...
M. Majdalawieh+2 more
openaire +3 more sources
This paper focuses on recommending the usage of the Role-Based Access Control (RBAC) model to define the users’ security roles, permissions, authorization, and role hierarchy to access the SCADA system. Achieving the desired level of authorization and access control will involve integrating the secur ity system with SCADA operations and building role ...
M. Majdalawieh+2 more
openaire +3 more sources
A graph-based formalism for RBAC
ACM Transactions on Information and System Security, 2002Role-Based Access Control (RBAC) is supported directly or in a closely related form, by a number of products. This article presents a formalization of RBAC using graph transformations that is a graphical specification technique based on a generalization of classical string grammars to nonlinear structures.
M. KOCH+2 more
openaire +3 more sources
RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies, 2010In a clear contrast with the phenomenal growth of Web database applications, access control issues related to data stored in the back-end databases have largely been neglected. Current approaches to access control on databases do not fit web databases because they are mostly based on individual user identities.
Adel Bouhoula+3 more
openaire +2 more sources
Mutually exclusive permissions in RBAC [PDF]
Role-based access control (RBAC) always provides tight security of information and ease of management to security policy. There are certain constraints which make the information security tight. Separation of duty (SOD) in terms of mutual exclusion and role inheritance (RI) are some of those constraints which provide security of information and make ...
Muhammad Asif Habib, Qaisar Abbas
openaire +1 more source
An extended RBAC profile of XACML
Proceedings of the 3rd ACM workshop on Secure web services, 2006Nowadays many organizations use security policies to control access to sensitive resources. Moreover, exchanging or sharing services and resources is essential for these organizations to achieve their business objectives. Since the eXtensible Access Control Markup Language (XACML) was standardized by the OASIS community, it has been widely deployed ...
Frédéric Cuppens+3 more
openaire +2 more sources
Contract RBAC in cloud computing
The Journal of Supercomputing, 2013Cloud computing is a fast growing field, which is arguably a new computing paradigm. In cloud computing, computing resources are provided as services over the Internet and users can access resources based on their payments. The issue of access control is an important security scheme in the cloud computing.
Marsha Anjanette Violetta+2 more
openaire +2 more sources
SC-RBAC: A Smart Contract based RBAC Model for DApps
2019Blockchain technology with its non-centralized, transparent, trustful, traceable and tamper-resistant features draws more and more attention both in commercial and scientific area. Smart contracts and DApps (Decentralized Applications) are programs naturally running automatically on blockchain. Access control is a principle that regulates the access to
Zhongyi Wu+4 more
openaire +2 more sources
A Multiple Hierarchies RBAC Model
2010 International Conference on Communications and Mobile Computing, 2010When a role in the classic hierarchy RBAC model gets more inherited permissions than the anticipant permissions of the administrator, there is the issue of excessive inheritance. This issue is addressed and a multiple hierarchies RBAC model is presented which extends from the classic hierarchy RBAC model in three aspects.
Wang Qinxian+2 more
openaire +2 more sources