Results 81 to 90 of about 12,389 (249)

A secure, constraint-aware role-based access control interoperation framework [PDF]

open access: yes, 2011
With the growing needs for and the benefits of sharing resources and information among different organizations, an interoperation framework that automatically integrates policies to facilitate such cross-domain sharing in a secure way is becoming ...
Baracaldo, N, Joshi, J, Masoumzadeh, A
core   +2 more sources

Guide in Designing an Asynchronous Performance‐Centric Framework for Heterogeneous Microservices in Time‐Critical Cybersecurity Applications. The BIECO Use Case

open access: yesExpert Systems, Volume 42, Issue 6, June 2025.
ABSTRACT This article presents the architecture, design and validation of a microservice orchestration approach that improves the flexibility of heterogeneous microservice‐based platforms. Improving user experience and interaction for time‐critical applications are aspects that were primary objectives for the design of the architecture.
Daniela Delinschi   +4 more
wiley   +1 more source

Support for ANSI RBAC in CORBA [PDF]

open access: yes, 2007
We describe access control mechanisms of the Common Ob ject Request Broker Architecture (CORBA) and define a configuration of the CORBA protection system in more precise and less ambiguous language than the CORBA Security specification (CORBASec). Using the configuration definition, we suggest an algorithm that formally specifies the semantics of ...
Wesam Darwish, Konstantin Beznosov
openaire   +1 more source

Analysis of ANSI RBAC Support in COM+ [PDF]

open access: yesComputer Standards & Interfaces, 2010
We analyze access control mechanisms of the COM+ architecture and define a configuration of the COM+ protection system in more precise and less ambiguous language than the COM+ documentation. Using this configuration, we suggest an algorithm that formally specifies the semantics of authorization decisions in COM+.
Wesam Darwish, Konstantin Beznosov
openaire   +2 more sources

Dynamic deployment of context-aware access control policies for constrained security devices [PDF]

open access: yes, 2009
Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements.
Cuppens, Frederic   +4 more
core   +1 more source

Role-Based Access Control Model for Inter-System Cross-Domain in Multi-Domain Environment

open access: yesApplied Sciences, 2022
Information service platforms or management information systems of various institutions or sectors of enterprises are gradually interconnected to form a multi-domain environment.
Yunliang Li   +3 more
doaj   +1 more source

Mining Stable Roles in RBAC [PDF]

open access: yes, 2009
In this paper we address the problem of generating a candidate role-set for an RBAC configuration that enjoys the following two key features: it minimizes the administration cost; and, it is a stable candidate role-set. To achieve these goals, we implement a three steps methodology: first, we associate a weight to roles; second, we identify and remove ...
Colantonio, Alessandro   +3 more
openaire   +2 more sources

Authorization algorithms for permission-role assignments [PDF]

open access: yes, 2009
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments.
Sun, Lili, Wang, Hua, Yong, Jianming
core   +2 more sources

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Scalable Role-based Access Control Using The EOS Blockchain [PDF]

open access: yesarXiv, 2020
Role-based access control (RBAC) policies represent the rights of subjects in terms of roles to access resources. This research proposes a scalable, flexible and auditable RBAC system using the EOS blockchain platform to meet the security requirements of organizations.
arxiv  

Home - About - Disclaimer - Privacy