Results 41 to 50 of about 12,389 (249)
A global transition to power grids with high penetrations of renewable energy generation is being driven in part by rapid installations of distributed energy resources (DER). New DER equipment includes standardized IEEE 1547-2018 communication interfaces
Georgios Fragkos+2 more
doaj +1 more source
A Service-Centric Approach to a Parameterized RBAC Service [PDF]
Significant research has been done in the area of Role Based Access Control [RBAC]. Within this research there has been a thread of work focusing on adding parameters to the role and permissions within RBAC. The primary benefit of parameter support in RBAC comes in the form of a significant increase in specificity in how permissions may be granted ...
arxiv +1 more source
A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context [PDF]
Role-Based Access Control (RBAC) is a popular model which maps roles to access permissions for resources and then roles to the users to provide access control. Role-Based Encryption (RBE) is a cryptographic form of RBAC model that integrates traditional RBAC with the cryptographic encryption method, where RBAC access policies are embedded in encrypted ...
arxiv +1 more source
RBAC in UNIX administration [PDF]
Glenn Faden
openalex +3 more sources
A Distributed Calculus for Role-Based Access Control [PDF]
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complexity and cost of security administration by interposing the notion of role in the assignment of permissions to users.
Braghin, C., Gorla, D., Sassone, V.
core +6 more sources
Global Liquified Natural Gas Trade under Energy Transition
With the recent rising attention and debates on the role of natural gas, especially liquid natural gas, in energy transition, it is critical to have a consistent approach in assessing uncertainties and dynamics in the global gas market during the next ...
Ning Lin, Robert E. Brooks
doaj +1 more source
Implementation of an efficient RBAC in Cloud Computing using .NET environment [PDF]
Cloud Computing is flourishing day by day and it will continue in developing phase until computers and internet era is in existence. While dealing with cloud computing, a number of security and traffic related issues are confronted. Load Balancing is one of the answers to these issues. RBAC deals with such an answer. The proposed technique involves the
arxiv +1 more source
Context-aware access control systems should reactively adapt access control decisions to dynamic environmental conditions. In this paper we present ERBAC – an event-driven extension of the TRBAC model that allows the specification and enforcement of general reactive policies – and its implementation.
Bonatti Piero+2 more
openaire +3 more sources
RelBAC: Relation Based Access Control [PDF]
TheWeb 2.0, GRID applications and, more recently, semantic desktop applications are bringing the Web to a situation where more and more data and metadata are shared and made available to large user groups. In this context, metadata may be tags or complex
Crispo, Bruno+2 more
core +1 more source
A Model-driven Role-based Access Control for SQL Databases
Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users.
Raimundas Matulevičius, Henri Lakk
doaj +1 more source