Results 21 to 30 of about 13,774 (222)
Design of Role Based Access Control for Triadic Concept Analysis
Formal concept analysis can be used to design access control hierarchy. There are investigations reported in the literature so far on the logic that transforms the three dimensional access control matrix into dyadic formal contexts. The transformation is
WANG Jing yu +2 more
doaj +1 more source
Refinement for Administrative Policies [PDF]
Flexibility of management is an important requisite for access control systems as it allows users to adapt the access control system in accordance with practical requirements. This paper builds on earlier work where we defined administrative policies for
Dekker, M.A.C., Etalle, S.
core +11 more sources
Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations.
Gabriel Nyame, Zhiguang Qin
doaj +1 more source
Role Minimization Optimization Algorithm Based on Concept Lattice Factor
Role-based access control (RBAC) is a widely adopted security model that provides a flexible and scalable approach for managing permissions in various domains.
Tao Wang, Qiang Wu
doaj +1 more source
How to Securely Break into RBAC: The BTG-RBAC Model [PDF]
Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on the role the user holds within the organization. Although flexible and easier to manage within large-scale authorization frameworks, RBAC is usually a static model where access ...
Ferreira, Ana +6 more
openaire +3 more sources
A dual-role hierarchical RBAC extended security model based on department attributes and its application [PDF]
In order to overcome the problems of the classic RBAC model, such as user identity cannot be verified, role assignment conflicts, permission leakage, complicated roles and permissions configuration, etc., this paper proposes a dual-role hierarchical RBAC
Zhang Xianghui +4 more
doaj +1 more source
Analyzing temporal role based access control models [PDF]
Today, Role Based Access Control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes.
Atluri, Vijayalakshmi +6 more
core +1 more source
A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach
Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations.
Santiago Figueroa-Lorenzo +2 more
doaj +1 more source
As mobile computing devices are becoming increasingly dominant in enterprise and government organizations, the need for fine-grained access control in these environments continues to grow. Specifically, advanced forms of access control can be deployed to ensure authorized users can access sensitive resources only when in trusted locations.
M. S. Kirkpatrick +2 more
openaire +3 more sources
This study investigated the effects of a modified rice bran arabinoxylan compound (RBAC) as a dietary supplement on the gut microbiota of healthy adults.
Emily Schupfer +5 more
doaj +1 more source

