Results 11 to 20 of about 1,891,300 (298)

An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things

open access: yesIEEE Access, 2017
Manufacturing Internet of Things (MIoT) represents the manufacturing oriented to Internet of Things with two important characteristics, resource sharing and process collaboration.
Qiang Liu   +3 more
doaj   +2 more sources

Enhancing Network Security in Mobile Applications with Role-Based Access Control

open access: goldJournal of Information Systems and Informatics
In today's dynamic networking environment, securing access to resources has become increasingly challenging due to the growth and progress of connected devices.
Ezichi Mpamugo, Godwin Ansa
doaj   +3 more sources

A Model-driven Role-based Access Control for SQL Databases

open access: diamondComplex Systems Informatics and Modeling Quarterly, 2015
Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users.
Raimundas Matulevičius, Henri Lakk
doaj   +3 more sources

Research on the multi-granularity method of role engineering

open access: yesFrontiers in Computational Neuroscience, 2022
The role-based access control model (RBAC) is an access control approach oriented to enterprise security policy, which plays a leading role in the field of access control due to its good applicability and flexibility.
Yongmei Jiao   +3 more
doaj   +1 more source

Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review

open access: yesJournal of Cybersecurity and Privacy, 2022
As the functionality and services provided by cloud computing increase, control access to these services becomes more complex, and more security breaches are generated. This is mainly based on the emergence of new requirements and constraints in the open,
Abdulghafour Mohammad
doaj   +1 more source

Role-based Access Control (RBAC) Authorization in Kubernetes

open access: yesJournal of ICT Standardization, 2023
In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users [1]. This paper will describe how the Kubernetes RBAC authorization sub-system works, how to leverage it
Garsha Rostami
semanticscholar   +1 more source

Application of role-based access control in cyber security of substation

open access: yesZhejiang dianli, 2022
By following the encrypted communication proposed by IEC 62351-3 and the identity authentication technology by IEC 62351-4, the paper carries out research on role-based access control technology on the theoretical basis of IEC 62351-8.
RUAN Lixiang   +3 more
doaj   +1 more source

Dynamic Role-Based Access Control for Decentralized Applications [PDF]

open access: yesInternational Conference on Blockchain, 2020
Access control management is an integral part of maintaining the security of an application. Although there has been significant work in the field of cloud access control mechanisms, however, with the advent of Distributed Ledger Technology (DLT), on ...
Arnab Chatterjee   +2 more
semanticscholar   +1 more source

Blockchain-based Role-Delegation Access Control for Industrial Control System [PDF]

open access: yesJisuanji kexue, 2021
The concept of "network perimeter" in industrial control system is becoming vague due to the integration of IT and OT technology.The fine-grained access control strategy that intends to protect each network connection can ensure the network security of ...
GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di
doaj   +1 more source

Home - About - Disclaimer - Privacy