Results 121 to 130 of about 5,194,532 (200)
Dynamically authorized role-based access control for grid applications [PDF]
Hanbing Yao+3 more
openalex +1 more source
Security analysis in role-based access control [PDF]
Ninghui Li, Mahesh Tripunitara
openalex +1 more source
On the Interaction Between Role-Based Access Control and Relational Databases
Sylvia L. Osborn+2 more
openalex +1 more source
DePLOI: Applying NL2SQL to Synthesize and Audit Database Access Control [PDF]
In every enterprise database, administrators must define an access control policy that specifies which users have access to which tables. Access control straddles two worlds: policy (organization-level principles that define who should have access) and process (database-level primitives that actually implement the policy).
arxiv
A Spatio-temporal Role-Based Access Control Model [PDF]
Indrakshi Ray, Manachai Toahchoodee
openalex +1 more source
Use of Role Based Access Control for Security-Purpose Hypervisors [PDF]
Chadwick, David W+2 more
core +1 more source
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL [PDF]
Karsten Sohr+3 more
openalex +1 more source
Background This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities.
Vesna Dimitrova, Elissa Mollakuqe
doaj
A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR [PDF]
Emrah Tomur, R. Deregozu, T. Genc
openalex +1 more source
Towards Formal Verification of Role-Based Access Control Policies [PDF]
Somesh Jha+4 more
openalex +1 more source