Results 321 to 330 of about 5,834,162 (365)

Role-based access control [PDF]

open access: bronzeProceedings of the first ACM Workshop on Role-based access control - RBAC '95, 1996
Luigi Giuri
openaire   +3 more sources
Some of the next articles are maybe not open access.

Related searches:

Role-Based Access Control and the Access Control Matrix

ACM SIGOPS Operating Systems Review, 2001
The Access Matrix is a useful model for understanding the behaviour and properties of access control systems. While the matrix is rarely implemented, access control in real systems is usually based on access control mechanisms, such as access control lists or capabilities, that have clear relationships with the matrix model.
Gregory Saunders   +2 more
openaire   +3 more sources

Role Based Access Control

2010
Im Jahr 1992 veroffentlichen David Ferraiolo und Richard Kuhn vom National Institute of Standards and Technology (NIST) einen Beitrag zu einer Konferenz uber Computersicherheit in den USA mit dem Titel „Role-Based Access Control (RBAC)“. Darin beschreiben sie die grundlegende Systematik der Berechtigungsvergabe mit Hilfe von Rollen und damit verbundene
Klaus Schmidt, Alexander Tsolkas
openaire   +4 more sources

Privacy-aware role based access control

Proceedings of the 12th ACM symposium on Access control models and technologies, 2007
In this article, we introduce a comprehensive framework supporting a privacy-aware access control mechanism, that is, a mechanism tailored to enforce access control to data containing personally identifiable information and, as such, privacy sensitive.
Q. Ni   +6 more
openaire   +7 more sources

Role-Based Access Control for Vehicular Adhoc Networks

International Black Sea Conference on Communications and Networking, 2018
VANET, the vehicular ad-hoc network, is a new communication technology that is characterized by a large amount of moving hosts, dynamic topology, and permanently changing data flows. VANE T specific features result in poor access control and isolation of
M. Kalinin   +3 more
semanticscholar   +1 more source

The Evaluation and Comparative Analysis of Role Based Access Control and Attribute Based Access Control Model

2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2018
Access control is used as a mechanism to secure the organizations from internal and external attacks. The implementation of access control is done with the help of different access control models through which RBAC and ABAC are on the top.
Muhammad Umar Aftab   +5 more
semanticscholar   +1 more source

Administration in role-based access control

Proceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
Administration of large-scale RBAC systems is a challenging open problem. We propose a principled approach in designing and analyzing administrative models for RBAC. We identify six design requirements for administrative models of RBAC. These design requirements are motivated by three principles for designing security mechanisms: (1) flexibility and ...
Ziqing Mao, Ninghui Li
openaire   +2 more sources

Role-Based Access Control on Graph Databases

2021
We propose a novel access control system for graph-based models, which supports schema constraints and constraint rules to protect the data, as well as user context rules. We consider systems with huge volumes of data, where the efficient processing of aggregation operations is of paramount importance.
Chabin, Jacques   +4 more
openaire   +2 more sources

Role Based Access Control and OWL

2008
Proceedings of the fourth OWL: Experiences and Directions ...
Bhavani Thuraisingham   +6 more
openaire   +2 more sources

A read-write abortion protocol to prevent illegal information flow in role-based access control systems

International Journal of Space-Based and Situated Computing, 2016
In information systems, a transaction may illegally read data stored in an object which the transaction is not allowed to read is stored in the object. A transaction illegally writes data to an object after issuing illegal read.
Shigenari Nakamura   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy