Results 41 to 50 of about 12,389 (249)

Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations

open access: yesEnergies, 2022
A global transition to power grids with high penetrations of renewable energy generation is being driven in part by rapid installations of distributed energy resources (DER). New DER equipment includes standardized IEEE 1547-2018 communication interfaces
Georgios Fragkos   +2 more
doaj   +1 more source

A Service-Centric Approach to a Parameterized RBAC Service [PDF]

open access: yesIn Proceedings of the 5th WSEAS International Conference on Applied Computer Science (ACOS 2006), 2006
Significant research has been done in the area of Role Based Access Control [RBAC]. Within this research there has been a thread of work focusing on adding parameters to the role and permissions within RBAC. The primary benefit of parameter support in RBAC comes in the form of a significant increase in specificity in how permissions may be granted ...
arxiv   +1 more source

A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context [PDF]

open access: yesIEEE Transaction on Service Computing, 2023, 2020
Role-Based Access Control (RBAC) is a popular model which maps roles to access permissions for resources and then roles to the users to provide access control. Role-Based Encryption (RBE) is a cryptographic form of RBAC model that integrates traditional RBAC with the cryptographic encryption method, where RBAC access policies are embedded in encrypted ...
arxiv   +1 more source

RBAC in UNIX administration [PDF]

open access: bronzeProceedings of the fourth ACM workshop on Role-based access control, 1999
Glenn Faden
openalex   +3 more sources

A Distributed Calculus for Role-Based Access Control [PDF]

open access: yes, 2004
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complexity and cost of security administration by interposing the notion of role in the assignment of permissions to users.
Braghin, C., Gorla, D., Sassone, V.
core   +6 more sources

Global Liquified Natural Gas Trade under Energy Transition

open access: yesEnergies, 2021
With the recent rising attention and debates on the role of natural gas, especially liquid natural gas, in energy transition, it is critical to have a consistent approach in assessing uncertainties and dynamics in the global gas market during the next ...
Ning Lin, Robert E. Brooks
doaj   +1 more source

Implementation of an efficient RBAC in Cloud Computing using .NET environment [PDF]

open access: yesRuhi Gupta. "Implementation of an Efficient RBAC Technique of Cloud Computing In .NET Environment in (IJCTT)V8(3):120125,February2014.ISSN:22312803.www.ijcttjournal.org.Published by Seventh Sense Research Group, 2014
Cloud Computing is flourishing day by day and it will continue in developing phase until computers and internet era is in existence. While dealing with cloud computing, a number of security and traffic related issues are confronted. Load Balancing is one of the answers to these issues. RBAC deals with such an answer. The proposed technique involves the
arxiv   +1 more source

Event-driven RBAC

open access: yesJournal of Computer Security, 2015
Context-aware access control systems should reactively adapt access control decisions to dynamic environmental conditions. In this paper we present ERBAC – an event-driven extension of the TRBAC model that allows the specification and enforcement of general reactive policies – and its implementation.
Bonatti Piero   +2 more
openaire   +3 more sources

RelBAC: Relation Based Access Control [PDF]

open access: yes, 2008
TheWeb 2.0, GRID applications and, more recently, semantic desktop applications are bringing the Web to a situation where more and more data and metadata are shared and made available to large user groups. In this context, metadata may be tags or complex
Crispo, Bruno   +2 more
core   +1 more source

A Model-driven Role-based Access Control for SQL Databases

open access: yesComplex Systems Informatics and Modeling Quarterly, 2015
Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users.
Raimundas Matulevičius, Henri Lakk
doaj   +1 more source

Home - About - Disclaimer - Privacy