Results 21 to 30 of about 5,194,532 (200)
CRiBAC: Community-centric role interaction based access control model [PDF]
As one of the most efficient solutions to complex and large-scale problems, multi-agent cooperation has been in the limelight for the past few decades.
Bhatti+23 more
core +2 more sources
A conditional role-involved purpose-based access control model [PDF]
This paper presents a role-involved conditional purpose-based access control (RCPBAC) model, where a purpose is defined as the intension of data accesses or usages. RCPBAC allows users using some data for certain purpose with conditions. The structure of
Bertino, Elisa+2 more
core +1 more source
RBAC-SC: Role-Based Access Control Using Smart Contract
The role-based access control (RBAC) framework is a mechanism that describes the access control principle. As a common interaction, an organization provides a service to a user who owns a certain role that was issued by a different organization.
Jason Paul Cruz+2 more
doaj +1 more source
The Internet of Things (IoT) connects many objects and allows continuous communication and data sharing has emerged as a revolutionary technology. However, expanding IoT devices has raised concerns regarding data security and access control.
Tanzeel Zaidi+4 more
doaj +1 more source
Self-Adaptive Role-Based Access Control for Business Processes [PDF]
© 2017 IEEE. We present an approach for dynamically reconfiguring the role-based access control (RBAC) of information systems running business processes, to protect them against insider threats. The new approach uses business process execution traces and
Calinescu, R+3 more
core +2 more sources
A global transition to power grids with high penetrations of renewable energy generation is being driven in part by rapid installations of distributed energy resources (DER). New DER equipment includes standardized IEEE 1547-2018 communication interfaces
Georgios Fragkos+2 more
doaj +1 more source
A Survey of Access Control Misconfiguration Detection Techniques [PDF]
Access control mechanisms have been adopted in many real-world systems to control resource sharing for the principals in the system. An error in the access control policy (misconfiguration) can easily cause severe data leakage and system exploitation.
arxiv
Manufacturing Internet of Things (MIoT) represents the manufacturing oriented to Internet of Things with two important characteristics, resource sharing and process collaboration.
Qiang Liu+3 more
doaj +1 more source
Role-Based Access Control Model for Inter-System Cross-Domain in Multi-Domain Environment
Information service platforms or management information systems of various institutions or sectors of enterprises are gradually interconnected to form a multi-domain environment.
Yunliang Li+3 more
doaj +1 more source
Model-Based Analysis of Role-Based Access Control [PDF]
Model-Driven Engineering (MDE) has been extensively studied. Many directions have been explored, sometimes with the dream of providing a fully integrated approach for designers, developers and other stakeholders to create, reason about and modify models ...
Montrieux, Lionel
core +3 more sources