Results 21 to 30 of about 12,389 (249)
Rice bran arabinoxylan compound (RBAC) is derived from defatted rice bran hydrolyzed with Lentinus edodes mycelial enzyme. It has been marketed as a functional food and a nutraceutical with health-promoting properties. Some research has demonstrated this
Soo Liang Ooi+6 more
doaj +1 more source
On automated RBAC assessment by constructing a centralized perspective for microservice mesh [PDF]
It is important in software development to enforce proper restrictions on protected services and resources. Typically software services can be accessed through REST API endpoints where restrictions can be applied using the Role-Based Access Control (RBAC)
Dipta Das+5 more
doaj +2 more sources
Cryptographically Enforced RBAC [PDF]
Cryptographic access control promises to offer easily distributed trust and broader applicability, while reducing reliance on low-level online monitors. Traditional implementations of cryptographic access control rely on simple cryptographic primitives whereas recent endeavors employ primitives with richer functionality and security guarantees ...
Ferrara, Anna Lisa+2 more
openaire +2 more sources
Role Minimization Optimization Algorithm Based on Concept Lattice Factor
Role-based access control (RBAC) is a widely adopted security model that provides a flexible and scalable approach for managing permissions in various domains.
Tao Wang, Qiang Wu
doaj +1 more source
How to Securely Break into RBAC: The BTG-RBAC Model [PDF]
Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on the role the user holds within the organization. Although flexible and easier to manage within large-scale authorization frameworks, RBAC is usually a static model where access ...
David W. Chadwick+6 more
openaire +2 more sources
Refinement for Administrative Policies [PDF]
Flexibility of management is an important requisite for access control systems as it allows users to adapt the access control system in accordance with practical requirements. This paper builds on earlier work where we defined administrative policies for
Dekker, M.A.C., Etalle, S.
core +11 more sources
Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations.
Gabriel Nyame, Zhiguang Qin
doaj +1 more source
A dual-role hierarchical RBAC extended security model based on department attributes and its application [PDF]
In order to overcome the problems of the classic RBAC model, such as user identity cannot be verified, role assignment conflicts, permission leakage, complicated roles and permissions configuration, etc., this paper proposes a dual-role hierarchical RBAC
Zhang Xianghui+4 more
doaj +1 more source
Analyzing temporal role based access control models [PDF]
Today, Role Based Access Control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes.
Atluri, Vijayalakshmi+6 more
core +1 more source