Results 61 to 70 of about 12,389 (249)
Benefits of Location-Based Access Control:A Literature Study [PDF]
Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud attackers supposedly have more difficulty in compromising a system.
Cleeff, André van+2 more
core +2 more sources
DEVELOPMENT OF ACCESS CONTROL MODEL TO PRIVATE MEDICAL INFORMATION
Modern medicine has grown to an insurmountable level over the past decades. Today, this sector of human life is a high-tech industry, where all areas that can save lives of previously hopeless patients are successfully developing. The technical equipment
Андрій Сергійович Андрійчук+1 more
doaj +1 more source
CRiBAC: Community-centric role interaction based access control model [PDF]
As one of the most efficient solutions to complex and large-scale problems, multi-agent cooperation has been in the limelight for the past few decades.
Bhatti+23 more
core +2 more sources
Self-Adaptive Role-Based Access Control for Business Processes [PDF]
© 2017 IEEE. We present an approach for dynamically reconfiguring the role-based access control (RBAC) of information systems running business processes, to protect them against insider threats. The new approach uses business process execution traces and
Calinescu, R+3 more
core +2 more sources
Significance and popularity of Role-Based Access Control (RBAC) is inevitable; however, its application is highly challenging in multi-domain collaborative smart city environments.
Rubina Ghazal+5 more
doaj +1 more source
ABSTRACT The advancement of artificial intelligence (AI) in material design and engineering has led to significant improvements in predictive modeling of material properties. However, the lack of interpretability in machine learning (ML)‐based material informatics presents a major barrier to its practical adoption.
Bokai Liu+3 more
wiley +1 more source
Application of the Extension RBAC Model in the Family Open Platform
Role-based access control(RBAC)technology is one of the hotspots in the research of access control.It is of great flexibility and high efficiency.The permission of RBAC model was refined,and four elements such as object,action,domain and group were added
We Li, Jing Wang
doaj +2 more sources
An Approach for Hierarchical RBAC Reconfiguration With Minimal Perturbation
In recent years, role-based access control (RBAC) has become the de facto access control model due to its good applicability and high flexibility.
Ning Pan+3 more
doaj +1 more source
RBAC for Healthcare-Infrastructure and data storage [PDF]
Role based Access control (RBAC) is the cornerstone of security for any modern organization. In this report, we defined a health-care access control structure based on RBAC. We used Alloy formal logic modeling tool to model and validate system functions. We modeled system static and dynamic or temporal behaviours.
arxiv
Policy Specification in Role based Access Control on Clouds [PDF]
Cloud Computing is a set of IT Services that are provided to a customer over a network and these services are delivered by third party provider who owns the infrastructure and reduce the burden at user's end. Nowadays researchers devoted their work access control method to enhance the security on Cloud.
arxiv +1 more source