Results 1 to 10 of about 5,194,532 (200)

Lambda-RBAC: Programming with Role-Based Access Control [PDF]

open access: diamondLogical Methods in Computer Science, 2008
We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanisms, which permit access controls to be expressed, in situ, as part of the code realizing basic functionality.
Radha Jagadeesan   +3 more
doaj   +4 more sources

Static Enforcement of Role-Based Access Control [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
We propose a new static approach to Role-Based Access Control (RBAC) policy enforcement. The static approach we advocate includes a new design methodology, for applications involving RBAC, which integrates the security requirements into the system's ...
Asad Ali, Maribel Fernández
doaj   +4 more sources

Dynamic Role-Based Access Control for Decentralized Applications [PDF]

open access: yesBlockchain -- ICBC 2020. Lecture Notes in Computer Science, vol 12404. Springer, Cham, 2020
Access control management is an integral part of maintaining the security of an application. Although there has been significant work in the field of cloud access control mechanisms, however, with the advent of Distributed Ledger Technology (DLT), on-chain access control management frameworks hardly exist.
C Dannen   +7 more
arxiv   +3 more sources

Efficient and Flexible Role-Based Access Control (EFRBAC) Mechanism for Cloud [PDF]

open access: diamondEAI Endorsed Transactions on Scalable Information Systems, 2020
The cloud reduces the user’s burden to many folds. But cloud providers and cloud users with dynamic relationship, are in distinct security domains. Amongst various challenges with cloud, the crucial one is to detect and protect the user’s data from ...
Shilpi Harnal, R.K. Chauhan
doaj   +3 more sources

Analyzing temporal role based access control models [PDF]

open access: green, 2012
Today, Role Based Access Control (RBAC) is the de facto model used for advanced access control, and is widely deployed in diverse enterprises of all sizes.
Emre Uzun   +6 more
openalex   +2 more sources

Managing Constraints in Role Based Access Control [PDF]

open access: goldIEEE Access, 2020
Role-based access control (RBAC) is the most popular access control model currently adopted in several contexts to define security management. Constraints play a crucial role since they can drive the selection of the best representation of the ...
Carlo Blundo   +2 more
doaj   +2 more sources

A secure, constraint-aware role-based access control interoperation framework [PDF]

open access: green, 2011
With the growing needs for and the benefits of sharing resources and information among different organizations, an interoperation framework that automatically integrates policies to facilitate such cross-domain sharing in a secure way is becoming ...
Nathalie Baracaldo   +2 more
openalex   +4 more sources

V-Model Role Engineering [PDF]

open access: yesInformatică economică, 2009
The paper focuses on role engineering which is an important topic in the development of access control system, particularly when considering Role Based Access Control – RBAC models.
Radu CONSTANTINESCU
doaj   +2 more sources

Secure role based access control systems using aspect-orientation designing [PDF]

open access: green, 2009
Security system designs are required to be flexible enough to support multiple policies. A security policy model always develops; accordingly, the design of a security system using that policy model should reflect the changes.
Muneer A. Hazaa   +3 more
openalex   +4 more sources

GPT, ontology, and CAABAC: A tripartite personalized access control model anchored by compliance, context and attribute. [PDF]

open access: yesPLoS One
As digital healthcare evolves, the security of electronic health records (EHR) becomes increasingly crucial. This study presents the GPT-Onto-CAABAC framework, integrating Generative Pretrained Transformer (GPT), medical-legal ontologies and Context-Aware Attribute-Based Access Control (CAABAC) to enhance EHR access security. Unlike traditional models,
Nowrozy R, Ahmed K, Wang H.
europepmc   +2 more sources

Home - About - Disclaimer - Privacy