Results 31 to 40 of about 12,389 (249)

A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach

open access: yesSensors, 2019
Industrial Control Systems (ICS) and Supervisory Control systems and Data Acquisition (SCADA) networks implement industrial communication protocols to enable their operations.
Santiago Figueroa-Lorenzo   +2 more
doaj   +1 more source

Prox-RBAC

open access: yesProceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2011
As mobile computing devices are becoming increasingly dominant in enterprise and government organizations, the need for fine-grained access control in these environments continues to grow. Specifically, advanced forms of access control can be deployed to ensure authorized users can access sensitive resources only when in trusted locations.
M. S. Kirkpatrick   +2 more
openaire   +4 more sources

Extended privilege inheritance in RBAC [PDF]

open access: yesProceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
In existing RBAC literature, administrative privileges are inherited just like ordinary user privileges. We argue that from a security viewpoint this is too restrictive, and we believe that a more flexible approach can be very useful in practice. We define an ordering on the set of administrative privileges, enabling us to extend the standard privilege
M.A.C. Dekker   +3 more
openaire   +6 more sources

Migrating from RBAC to temporal RBAC

open access: yesIET Information Security, 2017
The last two decades have witnessed an emergence of role-based access control (RBAC) as the de facto standard for access control. However, for organisations already having a deployed RBAC system, in many cases it may become necessary to associate a temporal dimension with the existing access control policies due to changing organisational requirements.
Vijayalakshmi Atluri   +3 more
openaire   +2 more sources

Authorization recycling in RBAC systems [PDF]

open access: yesProceedings of the 13th ACM symposium on Access control models and technologies, 2008
As distributed applications increase in size and complexity, traditional authorization mechanisms based on a single policy decision point are increasingly fragile because this decision point represents a single point of failure and a performance bottleneck. Authorization recycling is one technique that has been used to address these challenges.
Matei Ripeanu   +3 more
openaire   +3 more sources

R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]

open access: yes, 2019
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W.   +4 more
core   +3 more sources

Intelligent Role-Based Access Control Model and Framework Using Semantic Business Roles in Multi-Domain Environments

open access: yesIEEE Access, 2020
Today's rapidly developing communication technologies and dynamic collaborative business models made the security of data and resources more crucial than ever especially in multi-domain environments like Cloud and Cyber-Physical Systems (CPS).
Rubina Ghazal   +5 more
doaj   +1 more source

Oracle R12 EBusiness Suite Role Based Access Control and Roles Lifecycle Management [PDF]

open access: yes, 2023
Oracle E-Business Suite R12 is a widely used ERP solution that provides integrated view of information across multiple functions and sources. It allows for simplified business process tools for Shared service model e.g. Centralized Operation where multiple operating units can be supported.
arxiv   +1 more source

RBAC-SC: Role-Based Access Control Using Smart Contract

open access: yesIEEE Access, 2018
The role-based access control (RBAC) framework is a mechanism that describes the access control principle. As a common interaction, an organization provides a service to a user who owns a certain role that was issued by a different organization.
Jason Paul Cruz   +2 more
doaj   +1 more source

An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain

open access: yesInformation, 2020
Access control has become problematic in several organizations because of the difficulty in establishing security and preventing malicious users from mimicking roles.
Gabriel Nyame   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy