Results 51 to 60 of about 5,194,532 (200)
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
The Industrial Internet motivates the research and development of Zero-Trust Architecture (ZTA). Role-Based Access Control (RBAC) as one of the key technologies for ZTA has become a hot topic. Role mining algorithms are crucial for RBAC and interpretable
Yaqi Yang+5 more
doaj +1 more source
Task-role-based Access Control Model in Smart Health-care System
As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue ...
Wang Peng, Jiang Lingyun
doaj +1 more source
How the Role-Based Trust Management Can Be Applied to Wireless Sensor Networks
Trust plays an important role in human life environments. That is why the researchers has been focusing on it for a long time. It allows us to delegate tasks and decisions to an appropriate person.
Anna Felkner
doaj +1 more source
Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations.
Gabriel Nyame, Zhiguang Qin
doaj +1 more source
A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing
With rapidly increasing adoption of cloud computing and the advancement of today mobile computing, it is inevitable that mobile devices are used to receive and send the data through the mobile cloud platform.
Somchart Fugkeaw
doaj +1 more source
Deep Learning meets Blockchain for Automated and Secure Access Control [PDF]
Access control is a critical component of computer security, governing access to system resources. However, designing policies and roles in traditional access control can be challenging and difficult to maintain in dynamic and complex systems, which is particularly problematic for organizations with numerous resources.
arxiv
Mobile security with location-aware role-based access control [PDF]
This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation of duty constraints (both static
K. Dietrich+3 more
core +2 more sources
Architecture for Enhancing Communication Security with RBAC IoT Protocol-Based Microgrids
In traditional power grids, the unidirectional flow of energy and information has led to a decrease in efficiency. To address this issue, the concept of microgrids with bidirectional flow and independent power sources has been introduced.
SooHyun Shin+3 more
doaj +1 more source
Cloud computing provides a ubiquitous data storage and access mechanism for organizations, industries, and smart grids to facilitate their operations. However, the concern in cloud storage systems is to secure data access control toward authentication ...
Ahmed Abdu Alattab+3 more
doaj +1 more source
Automated Verification Of Role-Based Access Control Policies Constraints Using Prover9
Access control policies are used to restrict access to sensitive records for authorized users only. One approach for specifying policies is using role based access control (RBAC) where authorization is given to roles instead of users.
Sabri, Khair Eddin
core +1 more source