Results 21 to 30 of about 1,891,300 (298)

Design of Role Based Access Control for Triadic Concept Analysis

open access: yesJournal of Harbin University of Science and Technology, 2020
Formal concept analysis can be used to design access control hierarchy. There are investigations reported in the literature so far on the logic that transforms the three dimensional access control matrix into dyadic formal contexts. The transformation is
WANG Jing yu   +2 more
doaj   +1 more source

Role Minimization Optimization Algorithm Based on Concept Lattice Factor

open access: yesMathematics, 2023
Role-based access control (RBAC) is a widely adopted security model that provides a flexible and scalable approach for managing permissions in various domains.
Tao Wang, Qiang Wu
doaj   +1 more source

An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach

open access: yesInf., 2022
The area of smart homes is one of the most popular for deploying smart connected devices. One of the most vulnerable aspects of smart homes is access control.
Safwa Ameer, James O. Benson, R. Sandhu
semanticscholar   +1 more source

Towards Secure, Flexible and Efficient Role Based Hospital’s Cloud Management System: Case Study [PDF]

open access: yesEAI Endorsed Transactions on Pervasive Health and Technology, 2020
INTRODUCTION: Many organizations of health care have recognized that quality of service can be improved bymaintaining e-records of patient’s reports, medical histories, surgeries recordings, etc.
Shilpi Harnal, R.K. Chauhan
doaj   +1 more source

Static Enforcement of Role-Based Access Control [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
We propose a new static approach to Role-Based Access Control (RBAC) policy enforcement. The static approach we advocate includes a new design methodology, for applications involving RBAC, which integrates the security requirements into the system's ...
Asad Ali, Maribel Fernández
doaj   +1 more source

Intelligent Role-Based Access Control Model and Framework Using Semantic Business Roles in Multi-Domain Environments

open access: yesIEEE Access, 2020
Today’s rapidly developing communication technologies and dynamic collaborative business models made the security of data and resources more crucial than ever especially in multi-domain environments like Cloud and Cyber-Physical Systems (CPS).
Rubina Ghazal   +5 more
semanticscholar   +1 more source

Research on Improved Access Control Mechanism of Internet of Things Devices Based on Ethereum [PDF]

open access: yesJisuanji gongcheng, 2021
The high mobility and weak computation capabilities of Internet of Things(IoT) device nodes lead to some problems in the traditional access control mechanism of IoT,including low security,and inefficient management of policy decision and policy ...
ZHANG Jianguo, HU Xiaohui
doaj   +1 more source

Lambda-RBAC: Programming with Role-Based Access Control [PDF]

open access: yesLogical Methods in Computer Science, 2008
We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanisms, which permit access controls to be expressed, in situ, as part of the code realizing basic functionality.
Radha Jagadeesan   +3 more
doaj   +1 more source

Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations

open access: yesEnergies, 2022
A global transition to power grids with high penetrations of renewable energy generation is being driven in part by rapid installations of distributed energy resources (DER). New DER equipment includes standardized IEEE 1547-2018 communication interfaces
Georgios Fragkos   +2 more
doaj   +1 more source

Enhancing Healthcare Security: A Unified RBAC and ABAC Risk-Aware Access Control Approach

open access: yesFuture Internet
Healthcare systems are increasingly vulnerable to security threats due to their reliance on digital platforms. Traditional access control models like Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) have limitations in ...
Hany F. Atlam, Yifu Yang
doaj   +1 more source

Home - About - Disclaimer - Privacy