Results 251 to 260 of about 1,891,300 (298)
Rural wealth is associated with the consumption of nutritious and healthy foods in Zambia. [PDF]
Tabe-Ojong MPJ +2 more
europepmc +1 more source
Role-Based Access Control in a Mobile Environment
Adriana Compagnoni +2 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Transactions on Human-Machine Systems, 2022
Role-based access control (RBAC) is adopted in the information and communication technology domain for authentication purposes. However, due to a very large number of entities within organizational access control (AC) systems, static RBAC management can ...
G. Fragkos, Jay Johnson, E. Tsiropoulou
semanticscholar +1 more source
Role-based access control (RBAC) is adopted in the information and communication technology domain for authentication purposes. However, due to a very large number of entities within organizational access control (AC) systems, static RBAC management can ...
G. Fragkos, Jay Johnson, E. Tsiropoulou
semanticscholar +1 more source
2025 4th International Conference on Computing and Information Technology (ICCIT)
This paper, titled “Zero Trust Implementation for Legacy Systems using Dynamic Microsegmentation, Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC),” addresses the critical cybersecurity challenges legacy systems pose.
Adedayo Jalil Bello +2 more
semanticscholar +1 more source
This paper, titled “Zero Trust Implementation for Legacy Systems using Dynamic Microsegmentation, Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC),” addresses the critical cybersecurity challenges legacy systems pose.
Adedayo Jalil Bello +2 more
semanticscholar +1 more source
Role-Based Access Control for Vehicular Adhoc Networks
International Black Sea Conference on Communications and Networking, 2018VANET, the vehicular ad-hoc network, is a new communication technology that is characterized by a large amount of moving hosts, dynamic topology, and permanently changing data flows. VANE T specific features result in poor access control and isolation of
M. Kalinin +3 more
semanticscholar +1 more source
2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2018
Access control is used as a mechanism to secure the organizations from internal and external attacks. The implementation of access control is done with the help of different access control models through which RBAC and ABAC are on the top.
Muhammad Umar Aftab +5 more
semanticscholar +1 more source
Access control is used as a mechanism to secure the organizations from internal and external attacks. The implementation of access control is done with the help of different access control models through which RBAC and ABAC are on the top.
Muhammad Umar Aftab +5 more
semanticscholar +1 more source
User authentication using Blockchain based smart contract in role-based access control
Peer-to-Peer Networking and Applications, 2021Priyanka Kamboj +2 more
semanticscholar +1 more source

