Results 31 to 40 of about 12,389 (249)
A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach
Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations.
Santiago Figueroa-Lorenzo+2 more
doaj +1 more source
As mobile computing devices are becoming increasingly dominant in enterprise and government organizations, the need for fine-grained access control in these environments continues to grow. Specifically, advanced forms of access control can be deployed to ensure authorized users can access sensitive resources only when in trusted locations.
M. S. Kirkpatrick+2 more
openaire +4 more sources
Extended privilege inheritance in RBAC [PDF]
In existing RBAC literature, administrative privileges are inherited just like ordinary user privileges. We argue that from a security viewpoint this is too restrictive, and we believe that a more flexible approach can be very useful in practice. We define an ordering on the set of administrative privileges, enabling us to extend the standard privilege
M.A.C. Dekker+3 more
openaire +6 more sources
Migrating from RBAC to temporal RBAC
The last two decades have witnessed an emergence of role-based access control (RBAC) as the de facto standard for access control. However, for organisations already having a deployed RBAC system, in many cases it may become necessary to associate a temporal dimension with the existing access control policies due to changing organisational requirements.
Vijayalakshmi Atluri+3 more
openaire +2 more sources
Authorization recycling in RBAC systems [PDF]
As distributed applications increase in size and complexity, traditional authorization mechanisms based on a single policy decision point are increasingly fragile because this decision point represents a single point of failure and a performance bottleneck. Authorization recycling is one technique that has been used to address these challenges.
Matei Ripeanu+3 more
openaire +3 more sources
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W.+4 more
core +3 more sources
Today's rapidly developing communication technologies and dynamic collaborative business models made the security of data and resources more crucial than ever especially in multi-domain environments like Cloud and Cyber-Physical Systems (CPS).
Rubina Ghazal+5 more
doaj +1 more source
Oracle R12 EBusiness Suite Role Based Access Control and Roles Lifecycle Management [PDF]
Oracle E-Business Suite R12 is a widely used ERP solution that provides integrated view of information across multiple functions and sources. It allows for simplified business process tools for Shared service model e.g. Centralized Operation where multiple operating units can be supported.
arxiv +1 more source
RBAC-SC: Role-Based Access Control Using Smart Contract
The role-based access control (RBAC) framework is a mechanism that describes the access control principle. As a common interaction, an organization provides a service to a user who owns a certain role that was issued by a different organization.
Jason Paul Cruz+2 more
doaj +1 more source
An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain
Access control has become problematic in several organizations because of the difficulty in establishing security and preventing malicious users from mimicking roles.
Gabriel Nyame+3 more
doaj +1 more source