Results 91 to 100 of about 5,194,532 (200)

Role-Based Information Ranking and Access Control [PDF]

open access: yes, 2005
This thesis presents a formal role-model based on a combination of approaches towards rolebased access control. This model is used both for access control and information ranking. Purpose: Healthcare information is required by law to be strictly secured.
Stenbakk, Bjørn-Erik Sæther   +1 more
core  

Security Aspects for Business Solution Development on Portal Technology [PDF]

open access: yesDatabase Systems Journal, 2012
In the scope of portal development, in order to talk about security issues, concerns, and solutions, it is necessary to define a few terms: authentication, authorization, Single Sign-On (SSO), confidentiality, integrity, and non-repudiation.
Ovidiu RĂDUTĂ, Adrian MUNTEANU
doaj  

Achieving Flexible and Self-Contained Data Protection in Cloud Computing

open access: yesIEEE Access, 2017
For enterprise systems running on public clouds in which the servers are outside the control domain of the enterprise, access control that was traditionally executed by reference monitors deployed on the system servers can no longer be trusted.
Bo Lang, Jinmiao Wang, Yanxi Liu
doaj   +1 more source

"Shifting Access Control Left" using Asset and Goal Models [PDF]

open access: yesarXiv
Access control needs have broad design implications, but access control specifications may be elicited before, during, or after these needs are captured. Because access control knowledge is distributed, we need to make knowledge asymmetries more transparent, and use expertise already available to stakeholders. In this paper, we present a tool-supported
arxiv  

Collaborative Access Control for IoT -- A Blockchain Approach [PDF]

open access: yesarXiv
The Internet of Things (IoT) necessitates robust access control mechanisms to secure a vast array of interconnected devices. Most of the existing IoT systems in practice use centralized solutions. We identify the problems in such solutions and adopt the blockchain based decentralized access control approach.
arxiv  

PML: An Interpreter-Based Access Control Policy Language for Web Services [PDF]

open access: yesarXiv, 2019
Access control is an important component for web services such as a cloud. Current clouds tend to design the access control mechanism together with the policy language on their own. It leads to two issues: (i) a cloud user has to learn different policy languages to use multiple clouds, and (ii) a cloud service provider has to customize an authorization
arxiv  

Proposed NIST standard for role-based access control [PDF]

open access: green, 2001
David F. Ferraiolo   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy