Results 331 to 340 of about 5,834,162 (365)
Some of the next articles are maybe not open access.

Generalized role-based access control

Proceedings 21st International Conference on Distributed Computing Systems, 2002
Generalized Role-Based Access Control (GRBAC) is a new paradigm for creating and maintaining rich access control policies. GRBAC leverages and extends the power of traditional role based access control (RBAC) by incorporating subject roles, object roles and environment roles into access control decisions.
M. Abamad, Matt Moyer
openaire   +2 more sources

Role-Based Access Control

2007
Role-based access control (RBAC) models have been introduced by several groups of researchers. We first introduce the basic components of the American National Standards Institute (ANSI) RBAC model and the role graph model; then we contrast some of the details of these two models.
openaire   +2 more sources

Practical Role-Based Access Control

Information Security Journal: A Global Perspective, 2009
This article presents access control from a general and a role-based perspective. The article's focus is role based Access Control from a practical vice a theoretical perspective. The article starts with some access control definitions and two secure access control models.
openaire   +2 more sources

Role-Based Access Control

2017
Role-Based Access Control, we discuss the principles of role-based access control. Two security extensions of the generic UML language—SecureUML and UMLsec—are considered to show various RBAC concerns and application principles. Based on the RBAC domain, a set of transformation rules are defined to link both approaches together and to support the ...
openaire   +2 more sources

Role-based Access Control

1998
Abstracts The basic concept of role-based access control (RBAC) is that permissions are associated with roles, and users are made members of appropriate roles, thereby acquiring the roles' permissions. This idea has been around since the advent of multi-user computing.
openaire   +2 more sources

User authentication using Blockchain based smart contract in role-based access control

Peer-to-Peer Networking and Applications, 2021
Priyanka Kamboj   +2 more
semanticscholar   +1 more source

Role-based access control through on-demand classification of electronic health record

Int. J. Electron. Heal., 2015
Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records.
B. Tiwari, Abhay Kumar
semanticscholar   +1 more source

A write abortion-based protocol in role-based access control systems

, 2015
In information systems, data in an object may illegally flow into another object if transactions manipulate the objects. In our previous studies, the read-abortion-based role-based synchronisation (RA-RBS) and object-based synchronisation (RA-OBS ...
Shigenari Nakamura   +3 more
semanticscholar   +1 more source

Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem

Journal on spesial topics in mobile networks and applications, 2020
Jian Xu   +4 more
semanticscholar   +1 more source

Role Based Access Control [PDF]

open access: possible, 2009
Yue Zhang, James Joshi
openaire   +1 more source

Home - About - Disclaimer - Privacy