Results 81 to 90 of about 12,389 (249)
A secure, constraint-aware role-based access control interoperation framework [PDF]
With the growing needs for and the benefits of sharing resources and information among different organizations, an interoperation framework that automatically integrates policies to facilitate such cross-domain sharing in a secure way is becoming ...
Baracaldo, N, Joshi, J, Masoumzadeh, A
core +2 more sources
ABSTRACT This article presents the architecture, design and validation of a microservice orchestration approach that improves the flexibility of heterogeneous microservice‐based platforms. Improving user experience and interaction for time‐critical applications are aspects that were primary objectives for the design of the architecture.
Daniela Delinschi+4 more
wiley +1 more source
Support for ANSI RBAC in CORBA [PDF]
We describe access control mechanisms of the Common Ob ject Request Broker Architecture (CORBA) and define a configuration of the CORBA protection system in more precise and less ambiguous language than the CORBA Security specification (CORBASec). Using the configuration definition, we suggest an algorithm that formally specifies the semantics of ...
Wesam Darwish, Konstantin Beznosov
openaire +1 more source
Analysis of ANSI RBAC Support in COM+ [PDF]
We analyze access control mechanisms of the COM+ architecture and define a configuration of the COM+ protection system in more precise and less ambiguous language than the COM+ documentation. Using this configuration, we suggest an algorithm that formally specifies the semantics of authorization decisions in COM+.
Wesam Darwish, Konstantin Beznosov
openaire +2 more sources
Dynamic deployment of context-aware access control policies for constrained security devices [PDF]
Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements.
Cuppens, Frederic+4 more
core +1 more source
Role-Based Access Control Model for Inter-System Cross-Domain in Multi-Domain Environment
Information service platforms or management information systems of various institutions or sectors of enterprises are gradually interconnected to form a multi-domain environment.
Yunliang Li+3 more
doaj +1 more source
Mining Stable Roles in RBAC [PDF]
In this paper we address the problem of generating a candidate role-set for an RBAC configuration that enjoys the following two key features: it minimizes the administration cost; and, it is a stable candidate role-set. To achieve these goals, we implement a three steps methodology: first, we associate a weight to roles; second, we identify and remove ...
Colantonio, Alessandro+3 more
openaire +2 more sources
Authorization algorithms for permission-role assignments [PDF]
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments.
Sun, Lili, Wang, Hua, Yong, Jianming
core +2 more sources
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni+2 more
wiley +1 more source
Scalable Role-based Access Control Using The EOS Blockchain [PDF]
Role-based access control (RBAC) policies represent the rights of subjects in terms of roles to access resources. This research proposes a scalable, flexible and auditable RBAC system using the EOS blockchain platform to meet the security requirements of organizations.
arxiv