Results 251 to 260 of about 1,891,300 (298)

Role-Based Access Control in a Mobile Environment

open access: green, 2006
Adriana Compagnoni   +2 more
openalex   +1 more source

Dynamic Role-Based Access Control Policy for Smart Grid Applications: An Offline Deep Reinforcement Learning Approach

IEEE Transactions on Human-Machine Systems, 2022
Role-based access control (RBAC) is adopted in the information and communication technology domain for authentication purposes. However, due to a very large number of entities within organizational access control (AC) systems, static RBAC management can ...
G. Fragkos, Jay Johnson, E. Tsiropoulou
semanticscholar   +1 more source

Zero Trust Implementation for Legacy Systems using Dynamic Microsegmentation, Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC)

2025 4th International Conference on Computing and Information Technology (ICCIT)
This paper, titled “Zero Trust Implementation for Legacy Systems using Dynamic Microsegmentation, Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC),” addresses the critical cybersecurity challenges legacy systems pose.
Adedayo Jalil Bello   +2 more
semanticscholar   +1 more source

Role-Based Access Control for Vehicular Adhoc Networks

International Black Sea Conference on Communications and Networking, 2018
VANET, the vehicular ad-hoc network, is a new communication technology that is characterized by a large amount of moving hosts, dynamic topology, and permanently changing data flows. VANE T specific features result in poor access control and isolation of
M. Kalinin   +3 more
semanticscholar   +1 more source

The Evaluation and Comparative Analysis of Role Based Access Control and Attribute Based Access Control Model

2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2018
Access control is used as a mechanism to secure the organizations from internal and external attacks. The implementation of access control is done with the help of different access control models through which RBAC and ABAC are on the top.
Muhammad Umar Aftab   +5 more
semanticscholar   +1 more source

User authentication using Blockchain based smart contract in role-based access control

Peer-to-Peer Networking and Applications, 2021
Priyanka Kamboj   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy