Results 91 to 100 of about 5,194,532 (200)
Role-Based Information Ranking and Access Control [PDF]
This thesis presents a formal role-model based on a combination of approaches towards rolebased access control. This model is used both for access control and information ranking. Purpose: Healthcare information is required by law to be strictly secured.
Stenbakk, Bjørn-Erik Sæther+1 more
core
Security Aspects for Business Solution Development on Portal Technology [PDF]
In the scope of portal development, in order to talk about security issues, concerns, and solutions, it is necessary to define a few terms: authentication, authorization, Single Sign-On (SSO), confidentiality, integrity, and non-repudiation.
Ovidiu RĂDUTĂ, Adrian MUNTEANU
doaj
Achieving Flexible and Self-Contained Data Protection in Cloud Computing
For enterprise systems running on public clouds in which the servers are outside the control domain of the enterprise, access control that was traditionally executed by reference monitors deployed on the system servers can no longer be trusted.
Bo Lang, Jinmiao Wang, Yanxi Liu
doaj +1 more source
"Shifting Access Control Left" using Asset and Goal Models [PDF]
Access control needs have broad design implications, but access control specifications may be elicited before, during, or after these needs are captured. Because access control knowledge is distributed, we need to make knowledge asymmetries more transparent, and use expertise already available to stakeholders. In this paper, we present a tool-supported
arxiv
A role-based access control model and reference implementation within a corporate intranet [PDF]
David F. Ferraiolo+2 more
openalex +1 more source
Collaborative Access Control for IoT -- A Blockchain Approach [PDF]
The Internet of Things (IoT) necessitates robust access control mechanisms to secure a vast array of interconnected devices. Most of the existing IoT systems in practice use centralized solutions. We identify the problems in such solutions and adopt the blockchain based decentralized access control approach.
arxiv
Reconciling role based management and role based access control [PDF]
Emil Lupu, Morris Sloman
openalex +1 more source
PML: An Interpreter-Based Access Control Policy Language for Web Services [PDF]
Access control is an important component for web services such as a cloud. Current clouds tend to design the access control mechanism together with the policy language on their own. It leads to two issues: (i) a cloud user has to learn different policy languages to use multiple clouds, and (ii) a cloud service provider has to customize an authorization
arxiv
Proposed NIST standard for role-based access control [PDF]
David F. Ferraiolo+4 more
openalex +1 more source