Results 21 to 30 of about 12,389 (249)

The Health-Promoting Properties and Clinical Applications of Rice Bran Arabinoxylan Modified with Shiitake Mushroom Enzyme—A Narrative Review

open access: yesMolecules, 2021
Rice bran arabinoxylan compound (RBAC) is derived from defatted rice bran hydrolyzed with Lentinus edodes mycelial enzyme. It has been marketed as a functional food and a nutraceutical with health-promoting properties. Some research has demonstrated this
Soo Liang Ooi   +6 more
doaj   +1 more source

On automated RBAC assessment by constructing a centralized perspective for microservice mesh [PDF]

open access: yesPeerJ Computer Science, 2021
It is important in software development to enforce proper restrictions on protected services and resources. Typically software services can be accessed through REST API endpoints where restrictions can be applied using the Role-Based Access Control (RBAC)
Dipta Das   +5 more
doaj   +2 more sources

Cryptographically Enforced RBAC [PDF]

open access: yes2013 IEEE 26th Computer Security Foundations Symposium, 2013
Cryptographic access control promises to offer easily distributed trust and broader applicability, while reducing reliance on low-level online monitors. Traditional implementations of cryptographic access control rely on simple cryptographic primitives whereas recent endeavors employ primitives with richer functionality and security guarantees ...
Ferrara, Anna Lisa   +2 more
openaire   +2 more sources

Role Minimization Optimization Algorithm Based on Concept Lattice Factor

open access: yesMathematics, 2023
Role-based access control (RBAC) is a widely adopted security model that provides a flexible and scalable approach for managing permissions in various domains.
Tao Wang, Qiang Wu
doaj   +1 more source

How to Securely Break into RBAC: The BTG-RBAC Model [PDF]

open access: yes2009 Annual Computer Security Applications Conference, 2009
Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on the role the user holds within the organization. Although flexible and easier to manage within large-scale authorization frameworks, RBAC is usually a static model where access ...
David W. Chadwick   +6 more
openaire   +2 more sources

Refinement for Administrative Policies [PDF]

open access: yes, 2007
Flexibility of management is an important requisite for access control systems as it allows users to adapt the access control system in accordance with practical requirements. This paper builds on earlier work where we defined administrative policies for
Dekker, M.A.C., Etalle, S.
core   +11 more sources

Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework

open access: yesInformation, 2020
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations.
Gabriel Nyame, Zhiguang Qin
doaj   +1 more source

A dual-role hierarchical RBAC extended security model based on department attributes and its application [PDF]

open access: yesE3S Web of Conferences, 2022
In order to overcome the problems of the classic RBAC model, such as user identity cannot be verified, role assignment conflicts, permission leakage, complicated roles and permissions configuration, etc., this paper proposes a dual-role hierarchical RBAC
Zhang Xianghui   +4 more
doaj   +1 more source

Analyzing temporal role based access control models [PDF]

open access: yes, 2012
Today, Role Based Access Control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes.
Atluri, Vijayalakshmi   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy