Results 41 to 50 of about 5,194,532 (200)

The Design and Implementation of a Secure Datastore Based on Ethereum Smart Contract

open access: yesApplied Sciences, 2023
In this paper, we present a secure datastore based on an Ethereum smart contract. Our research is guided by three research questions. First, we will explore to what extend a smart-contract-based datastore should resemble a traditional database system ...
Izdehar M. Aldyaflah   +3 more
doaj   +1 more source

Reconfiguring Role-Based Access Control via Role Clustering

open access: yesIEEE Access
Role-based access control (RBAC) systems have become a widely used and accepted method by many organizations today due to their efficiency and ease of management.
Osman Durdag, Ahmet Coskuncay
doaj   +1 more source

An Optimized Role-Based Access Control Using Trust Mechanism in E-Health Cloud Environment

open access: yesIEEE Access, 2023
In today’s world, services are improved and advanced in every field of life. Especially in the health sector, information technology (IT) plays a vigorous role in electronic health (e-health).
Ateeq Ur Rehman Butt   +6 more
doaj   +1 more source

A Customizable Conflict Resolution and Attribute-Based Access Control Framework for Multi-Robot Systems [PDF]

open access: yesarXiv, 2023
As multi-robot systems continue to advance and become integral to various applications, managing conflicts and ensuring secure access control are critical challenges that need to be addressed. Access control is essential in multi-robot systems to ensure secure and authorized interactions among robots, protect sensitive data, and prevent unauthorized ...
arxiv  

Cognitive Radio for Smart Grid with Security Considerations

open access: yesComputers, 2016
In this paper, we investigate how Cognitive Radio as a means of communication can be utilized to serve a smart grid deployment end to end, from a home area network to power generation.
Khaled Shuaib   +4 more
doaj   +1 more source

Role - based Access Control in Educational Administration System

open access: yesMATEC Web of Conferences, 2017
In the 21st century, the network of teaching management not only improves its quality and efficiency but also brings convenience to teachers and students. However, as a network application system, it also faces a variety of security issues.
Dongdong Liu   +5 more
doaj   +1 more source

Hybrid Role and Attribute Based Access Control Applied in Information Systems

open access: yesCybernetics and Information Technologies, 2021
It this paper it is proposed a new access control model – Hybrid Role and Attribute Based Access Control (HRABAC). It is an extension of Role-Based Access Control (RBAC). HRABAC is designed for information systems and enterprise software and combines the
Penelova Maria
doaj   +1 more source

A Dynamic Access Control Model Using Authorising Workfow and Task Role-based Access Control [PDF]

open access: yes, 2020
Access control is fundamental and prerequisite to govern and safeguard information assets within an organisation. Organisations generally use Web enabled remote access coupled with applications access distributed across various networks.
Uddin, M., Uddin, M.
core   +1 more source

Blockchain based access control systems: State of the art and challenges [PDF]

open access: yes, 2019
Access to the system resources. The current access control systems face many problems, such as the presence of the third-party, inefficiency, and lack of privacy. These problems can be addressed by blockchain, the technology that received major attention in recent years and has many potentials.
arxiv   +1 more source

Security Analysis of Role-based Access Control through Program Verification

open access: yes, 2012
We propose a novel scheme for proving administrative role-based access control (ARBAC) policies correct with respect to security properties using the powerful abstraction based tools available for program verification.
Ferrara, Anna Lisa   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy