Results 51 to 60 of about 5,194,532 (200)

IRMAOC: an interpretable role mining algorithm based on overlapping clustering

open access: yesCybersecurity
The Industrial Internet motivates the research and development of Zero-Trust Architecture (ZTA). Role-Based Access Control (RBAC) as one of the key technologies for ZTA has become a hot topic. Role mining algorithms are crucial for RBAC and interpretable
Yaqi Yang   +5 more
doaj   +1 more source

Task-role-based Access Control Model in Smart Health-care System

open access: yesMATEC Web of Conferences, 2015
As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue ...
Wang Peng, Jiang Lingyun
doaj   +1 more source

How the Role-Based Trust Management Can Be Applied to Wireless Sensor Networks

open access: yesJournal of Telecommunications and Information Technology, 2012
Trust plays an important role in human life environments. That is why the researchers has been focusing on it for a long time. It allows us to delegate tasks and decisions to an appropriate person.
Anna Felkner
doaj   +1 more source

Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework

open access: yesInformation, 2020
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations.
Gabriel Nyame, Zhiguang Qin
doaj   +1 more source

A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing

open access: yesIEEE Access, 2021
With rapidly increasing adoption of cloud computing and the advancement of today mobile computing, it is inevitable that mobile devices are used to receive and send the data through the mobile cloud platform.
Somchart Fugkeaw
doaj   +1 more source

Deep Learning meets Blockchain for Automated and Secure Access Control [PDF]

open access: yesInternational Journal of Security, Privacy and Trust Management (IJSPTM) Vol 12, No 3/4, November 2023, 2023
Access control is a critical component of computer security, governing access to system resources. However, designing policies and roles in traditional access control can be challenging and difficult to maintain in dynamic and complex systems, which is particularly problematic for organizations with numerous resources.
arxiv  

Mobile security with location-aware role-based access control [PDF]

open access: yes, 2012
This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation of duty constraints (both static
K. Dietrich   +3 more
core   +2 more sources

Architecture for Enhancing Communication Security with RBAC IoT Protocol-Based Microgrids

open access: yesSensors
In traditional power grids, the unidirectional flow of energy and information has led to a decrease in efficiency. To address this issue, the concept of microgrids with bidirectional flow and independent power sources has been introduced.
SooHyun Shin   +3 more
doaj   +1 more source

Privacy Protected Preservation of Electric Vehicles’ Data in Cloud Computing Using Secure Data Access Control

open access: yesEnergies, 2022
Cloud computing provides a ubiquitous data storage and access mechanism for organizations, industries, and smart grids to facilitate their operations. However, the concern in cloud storage systems is to secure data access control toward authentication ...
Ahmed Abdu Alattab   +3 more
doaj   +1 more source

Automated Verification Of Role-Based Access Control Policies Constraints Using Prover9

open access: yes, 2015
Access control policies are used to restrict access to sensitive records for authorized users only. One approach for specifying policies is using role based access control (RBAC) where authorization is given to roles instead of users.
Sabri, Khair Eddin
core   +1 more source

Home - About - Disclaimer - Privacy