Results 1 to 10 of about 5,194,532 (200)
Lambda-RBAC: Programming with Role-Based Access Control [PDF]
We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanisms, which permit access controls to be expressed, in situ, as part of the code realizing basic functionality.
Radha Jagadeesan+3 more
doaj +4 more sources
Static Enforcement of Role-Based Access Control [PDF]
We propose a new static approach to Role-Based Access Control (RBAC) policy enforcement. The static approach we advocate includes a new design methodology, for applications involving RBAC, which integrates the security requirements into the system's ...
Asad Ali, Maribel Fernández
doaj +4 more sources
Dynamic Role-Based Access Control for Decentralized Applications [PDF]
Access control management is an integral part of maintaining the security of an application. Although there has been significant work in the field of cloud access control mechanisms, however, with the advent of Distributed Ledger Technology (DLT), on-chain access control management frameworks hardly exist.
C Dannen+7 more
arxiv +3 more sources
Efficient and Flexible Role-Based Access Control (EFRBAC) Mechanism for Cloud [PDF]
The cloud reduces the user’s burden to many folds. But cloud providers and cloud users with dynamic relationship, are in distinct security domains. Amongst various challenges with cloud, the crucial one is to detect and protect the user’s data from ...
Shilpi Harnal, R.K. Chauhan
doaj +3 more sources
Analyzing temporal role based access control models [PDF]
Today, Role Based Access Control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes.
Emre Uzun+6 more
openalex +2 more sources
Managing Constraints in Role Based Access Control [PDF]
Role-based access control (RBAC) is the most popular access control model currently adopted in several contexts to define security management. Constraints play a crucial role since they can drive the selection of the best representation of the ...
Carlo Blundo+2 more
doaj +2 more sources
A secure, constraint-aware role-based access control interoperation framework [PDF]
With the growing needs for and the benefits of sharing resources and information among different organizations, an interoperation framework that automatically integrates policies to facilitate such cross-domain sharing in a secure way is becoming ...
Nathalie Baracaldo+2 more
openalex +4 more sources
V-Model Role Engineering [PDF]
The paper focuses on role engineering which is an important topic in the development of access control system, particularly when considering Role Based Access Control – RBAC models.
Radu CONSTANTINESCU
doaj +2 more sources
Secure role based access control systems using aspect-orientation designing [PDF]
Security system designs are required to be flexible enough to support multiple policies. A security policy model always develops; accordingly, the design of a security system using that policy model should reflect the changes.
Muneer A. Hazaa+3 more
openalex +4 more sources
GPT, ontology, and CAABAC: A tripartite personalized access control model anchored by compliance, context and attribute. [PDF]
As digital healthcare evolves, the security of electronic health records (EHR) becomes increasingly crucial. This study presents the GPT-Onto-CAABAC framework, integrating Generative Pretrained Transformer (GPT), medical-legal ontologies and Context-Aware Attribute-Based Access Control (CAABAC) to enhance EHR access security. Unlike traditional models,
Nowrozy R, Ahmed K, Wang H.
europepmc +2 more sources