Results 11 to 20 of about 1,891,300 (298)
Manufacturing Internet of Things (MIoT) represents the manufacturing oriented to Internet of Things with two important characteristics, resource sharing and process collaboration.
Qiang Liu +3 more
doaj +2 more sources
Blockchain based electronic educational document management with role-based access control using machine learning model. [PDF]
Chinnasamy P +6 more
europepmc +3 more sources
Enhancing Network Security in Mobile Applications with Role-Based Access Control
In today's dynamic networking environment, securing access to resources has become increasingly challenging due to the growth and progress of connected devices.
Ezichi Mpamugo, Godwin Ansa
doaj +3 more sources
A Model-driven Role-based Access Control for SQL Databases
Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users.
Raimundas Matulevičius, Henri Lakk
doaj +3 more sources
Research on the multi-granularity method of role engineering
The role-based access control model (RBAC) is an access control approach oriented to enterprise security policy, which plays a leading role in the field of access control due to its good applicability and flexibility.
Yongmei Jiao +3 more
doaj +1 more source
Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review
As the functionality and services provided by cloud computing increase, control access to these services becomes more complex, and more security breaches are generated. This is mainly based on the emergence of new requirements and constraints in the open,
Abdulghafour Mohammad
doaj +1 more source
Role-based Access Control (RBAC) Authorization in Kubernetes
In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users [1]. This paper will describe how the Kubernetes RBAC authorization sub-system works, how to leverage it
Garsha Rostami
semanticscholar +1 more source
Application of role-based access control in cyber security of substation
By following the encrypted communication proposed by IEC 62351-3 and the identity authentication technology by IEC 62351-4, the paper carries out research on role-based access control technology on the theoretical basis of IEC 62351-8.
RUAN Lixiang +3 more
doaj +1 more source
Dynamic Role-Based Access Control for Decentralized Applications [PDF]
Access control management is an integral part of maintaining the security of an application. Although there has been significant work in the field of cloud access control mechanisms, however, with the advent of Distributed Ledger Technology (DLT), on ...
Arnab Chatterjee +2 more
semanticscholar +1 more source
Blockchain-based Role-Delegation Access Control for Industrial Control System [PDF]
The concept of "network perimeter" in industrial control system is becoming vague due to the integration of IT and OT technology.The fine-grained access control strategy that intends to protect each network connection can ensure the network security of ...
GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di
doaj +1 more source

