Results 41 to 50 of about 13,774 (222)

Authorization recycling in RBAC systems [PDF]

open access: yesProceedings of the 13th ACM symposium on Access control models and technologies, 2008
As distributed applications increase in size and complexity, traditional authorization mechanisms based on a single policy decision point are increasingly fragile because this decision point represents a single point of failure and a performance bottleneck. Authorization recycling is one technique that has been used to address these challenges.
Wei, Qiang   +3 more
openaire   +1 more source

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

Extended privilege inheritance in RBAC [PDF]

open access: yesProceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
In existing RBAC literature, administrative privileges are inherited just like ordinary user privileges. We argue that from a security viewpoint this is too restrictive, and we believe that a more flexible approach can be very useful in practice. We define an ordering on the set of administrative privileges, enabling us to extend the standard privilege
Dekker, M.A.C.   +3 more
openaire   +5 more sources

A Model-driven Role-based Access Control for SQL Databases

open access: yesComplex Systems Informatics and Modeling Quarterly, 2015
Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users.
Raimundas Matulevičius, Henri Lakk
doaj   +1 more source

A Cloud-ready Architecture for Shared Medical Imaging Repository

open access: yes, 2020
Background and Objective: Nowadays usage paradigms of medical imaging resources are requesting vendor-neutral archives, accessible through standard interfaces, with multi-repository support.
Bastião, Luís   +2 more
core   +1 more source

Compressive strength and elastic modulus of RBAC: An analysis of existing data and an artificial intelligence based prediction

open access: yesCase Studies in Construction Materials, 2023
In recent years crushing waste brick to produce recycled brick aggregates (RBAs) has become a viable solution for reducing environmental pollution and addressing the natural resource shortage in civil engineering.
Lang Lin   +3 more
doaj   +1 more source

Dynamic deployment of context-aware access control policies for constrained security devices [PDF]

open access: yes, 2009
Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements.
Cuppens, Frederic   +4 more
core   +1 more source

Rose Bengal acetate photodynamic therapy (RBAc-PDT) induces exposure and release of Damage-Associated Molecular Patterns (DAMPs) in human HeLa cells.

open access: yesPLoS ONE, 2014
The new concept of Immunogenic Cell Death (ICD), associated with Damage Associated Molecular Patterns (DAMPs) exposure and/or release, is recently becoming very appealing in cancer treatment.
Elisa Panzarini   +3 more
doaj   +1 more source

Authorization algorithms for permission-role assignments [PDF]

open access: yes, 2009
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments.
Sun, Lili, Wang, Hua, Yong, Jianming
core   +2 more sources

Towards user-oriented RBAC model [PDF]

open access: yesJournal of Computer Security, 2013
Role mining is to define a role set to implement the role-based access control (RBAC) system and regarded as one of the most important and costliest implementation phases. While various role mining models have been proposed, we find that user experience/perception – one ultimate goal for any information system – is surprisingly ignored by the existing
Lu, Haibing   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy