Results 11 to 20 of about 5,194,532 (200)
Research on the multi-granularity method of role engineering
The role-based access control model (RBAC) is an access control approach oriented to enterprise security policy, which plays a leading role in the field of access control due to its good applicability and flexibility.
Yongmei Jiao+3 more
doaj +1 more source
Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review
As the functionality and services provided by cloud computing increase, control access to these services becomes more complex, and more security breaches are generated. This is mainly based on the emergence of new requirements and constraints in the open,
Abdulghafour Mohammad
doaj +1 more source
Multi-Level Security Model Developed to Provide Data Privacy in Distributed Database Systems
Information security is related to efforts put in to avoid activities such as unauthorized usage, changing or disseminating of information by having access to these pieces of information.
Cigdem Bakir*, Mehmet Guclu
doaj +1 more source
Application of role-based access control in cyber security of substation
By following the encrypted communication proposed by IEC 62351-3 and the identity authentication technology by IEC 62351-4, the paper carries out research on role-based access control technology on the theoretical basis of IEC 62351-8.
RUAN Lixiang+3 more
doaj +1 more source
Blockchain-based Role-Delegation Access Control for Industrial Control System [PDF]
The concept of "network perimeter" in industrial control system is becoming vague due to the integration of IT and OT technology.The fine-grained access control strategy that intends to protect each network connection can ensure the network security of ...
GUO Xian, WANG Yu-yue, FENG Tao, CAO Lai-cheng, JIANG Yong-bo, ZHANG Di
doaj +1 more source
Role Minimization Optimization Algorithm Based on Concept Lattice Factor
Role-based access control (RBAC) is a widely adopted security model that provides a flexible and scalable approach for managing permissions in various domains.
Tao Wang, Qiang Wu
doaj +1 more source
Fuzzy role-based access control [PDF]
RBAC (Role-Based Access Control) is a widely used access control model, which reduces the maintenance cost of classical identity-based access control. However, despite the benefits of RBAC, there are environments in which RBAC can hardly be applied.
Borrell, Joan+2 more
core +5 more sources
Towards Secure, Flexible and Efficient Role Based Hospital’s Cloud Management System: Case Study [PDF]
INTRODUCTION: Many organizations of health care have recognized that quality of service can be improved bymaintaining e-records of patient’s reports, medical histories, surgeries recordings, etc.
Shilpi Harnal, R.K. Chauhan
doaj +1 more source
Cryptographic Role-Based Access Control, Reconsidered [PDF]
A significant shortcoming of traditional access control mechanisms is their heavy reliance on reference monitors. Being single points of failure, monitors need to run in protected mode and have permanent online presence in order to handle all access ...
Liu, B.+5 more
core +1 more source
A Distributed Calculus for Role-Based Access Control [PDF]
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complexity and cost of security administration by interposing the notion of role in the assignment of permissions to users.
Braghin, C., Gorla, D., Sassone, V.
core +6 more sources