The Design and Implementation of a Secure Datastore Based on Ethereum Smart Contract
In this paper, we present a secure datastore based on an Ethereum smart contract. Our research is guided by three research questions. First, we will explore to what extend a smart-contract-based datastore should resemble a traditional database system ...
Izdehar M. Aldyaflah+3 more
doaj +1 more source
Reconfiguring Role-Based Access Control via Role Clustering
Role-based access control (RBAC) systems have become a widely used and accepted method by many organizations today due to their efficiency and ease of management.
Osman Durdag, Ahmet Coskuncay
doaj +1 more source
An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment
In today’s world, services are improved and advanced in every field of life. Especially in the health sector, information technology (IT) plays a vigorous role in electronic health (e-health).
Ateeq Ur Rehman Butt+6 more
doaj +1 more source
A Customizable Conflict Resolution and Attribute-Based Access Control Framework for Multi-Robot Systems [PDF]
As multi-robot systems continue to advance and become integral to various applications, managing conflicts and ensuring secure access control are critical challenges that need to be addressed. Access control is essential in multi-robot systems to ensure secure and authorized interactions among robots, protect sensitive data, and prevent unauthorized ...
arxiv
Cognitive Radio for Smart Grid with Security Considerations
In this paper, we investigate how Cognitive Radio as a means of communication can be utilized to serve a smart grid deployment end to end, from a home area network to power generation.
Khaled Shuaib+4 more
doaj +1 more source
Role - based Access Control in Educational Administration System
In the 21st century, the network of teaching management not only improves its quality and efficiency but also brings convenience to teachers and students. However, as a network application system, it also faces a variety of security issues.
Dongdong Liu+5 more
doaj +1 more source
Hybrid Role and Attribute Based Access Control Applied in Information Systems
It this paper it is proposed a new access control model – Hybrid Role and Attribute Based Access Control (HRABAC). It is an extension of Role-Based Access Control (RBAC). HRABAC is designed for information systems and enterprise software and combines the
Penelova Maria
doaj +1 more source
A Dynamic Access Control Model Using Authorising Workfow and Task Role-based Access Control [PDF]
Access control is fundamental and prerequisite to govern and safeguard information assets within an organisation. Organisations generally use Web enabled remote access coupled with applications access distributed across various networks.
Uddin, M., Uddin, M.
core +1 more source
Blockchain based access control systems: State of the art and challenges [PDF]
Access to the system resources. The current access control systems face many problems, such as the presence of the third-party, inefficiency, and lack of privacy. These problems can be addressed by blockchain, the technology that received major attention in recent years and has many potentials.
arxiv +1 more source
Security Analysis of Role-based Access Control through Program Verification
We propose a novel scheme for proving administrative role-based access control (ARBAC) policies correct with respect to security properties using the powerful abstraction based tools available for program verification.
Ferrara, Anna Lisa+2 more
core +2 more sources