Results 21 to 30 of about 13,774 (222)

Design of Role Based Access Control for Triadic Concept Analysis

open access: yesJournal of Harbin University of Science and Technology, 2020
Formal concept analysis can be used to design access control hierarchy. There are investigations reported in the literature so far on the logic that transforms the three dimensional access control matrix into dyadic formal contexts. The transformation is
WANG Jing yu   +2 more
doaj   +1 more source

Refinement for Administrative Policies [PDF]

open access: yes, 2007
Flexibility of management is an important requisite for access control systems as it allows users to adapt the access control system in accordance with practical requirements. This paper builds on earlier work where we defined administrative policies for
Dekker, M.A.C., Etalle, S.
core   +11 more sources

Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework

open access: yesInformation, 2020
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations.
Gabriel Nyame, Zhiguang Qin
doaj   +1 more source

Role Minimization Optimization Algorithm Based on Concept Lattice Factor

open access: yesMathematics, 2023
Role-based access control (RBAC) is a widely adopted security model that provides a flexible and scalable approach for managing permissions in various domains.
Tao Wang, Qiang Wu
doaj   +1 more source

How to Securely Break into RBAC: The BTG-RBAC Model [PDF]

open access: yes2009 Annual Computer Security Applications Conference, 2009
Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on the role the user holds within the organization. Although flexible and easier to manage within large-scale authorization frameworks, RBAC is usually a static model where access ...
Ferreira, Ana   +6 more
openaire   +3 more sources

A dual-role hierarchical RBAC extended security model based on department attributes and its application [PDF]

open access: yesE3S Web of Conferences, 2022
In order to overcome the problems of the classic RBAC model, such as user identity cannot be verified, role assignment conflicts, permission leakage, complicated roles and permissions configuration, etc., this paper proposes a dual-role hierarchical RBAC
Zhang Xianghui   +4 more
doaj   +1 more source

Analyzing temporal role based access control models [PDF]

open access: yes, 2012
Today, Role Based Access Control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes.
Atluri, Vijayalakshmi   +6 more
core   +1 more source

A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach

open access: yesSensors, 2019
Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations.
Santiago Figueroa-Lorenzo   +2 more
doaj   +1 more source

Prox-RBAC

open access: yesProceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2011
As mobile computing devices are becoming increasingly dominant in enterprise and government organizations, the need for fine-grained access control in these environments continues to grow. Specifically, advanced forms of access control can be deployed to ensure authorized users can access sensitive resources only when in trusted locations.
M. S. Kirkpatrick   +2 more
openaire   +3 more sources

Changes in the Human Gut Microbiome during Dietary Supplementation with Modified Rice Bran Arabinoxylan Compound

open access: yesMolecules, 2023
This study investigated the effects of a modified rice bran arabinoxylan compound (RBAC) as a dietary supplement on the gut microbiota of healthy adults.
Emily Schupfer   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy