Results 61 to 70 of about 5,194,532 (200)
An evaluation of break-the-glass access control model for medical data in wireless sensor networks [PDF]
Wireless Sensor Networks (WSNs) have recently attracted a lot of attention in the research community because it is easy to deploy them in the physical environment and collect and disseminate environmental data from them.
Christianson, B.+3 more
core +1 more source
Security Analysis of Interaction between RBAC Model and Distributed Administrative Model
This paper proposes a formal approach to security analysis of a RBAC model which specification contains a model of distributed administration for user role assignment. A high-level description of security verification algorithm is provided.
N. A. Semenova
doaj
Role-based Access Control (RBAC) promises an efficient authorization management system in accessing resources including electric vehicle (EV) data stored in the cloud server.
Amang Sudarsono+3 more
doaj +1 more source
Shortcomings of access control strategy in existing information management systems of coal mine were analyzed, and some views were pointed out that basic functions of account control strategy was simple in function and immutable in right during system ...
CHEN Yunqi, XU Ji
doaj +1 more source
Authorization algorithms for permission-role assignments [PDF]
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments.
Sun, Lili, Wang, Hua, Yong, Jianming
core +2 more sources
Implementation of Formal Semantics and the Potential of Non-Classical Logic Systems for the Enhancement of Access Control Models: A Literature Review [PDF]
This literature review discovers an implementation of formal logic systems in cyber security by enhancing access control models. We explore the characteristics of the existing access control theories, their limitations and how classical logic is used therein.
arxiv
RelBAC: Relation Based Access Control [PDF]
TheWeb 2.0, GRID applications and, more recently, semantic desktop applications are bringing the Web to a situation where more and more data and metadata are shared and made available to large user groups. In this context, metadata may be tags or complex
Crispo, Bruno+2 more
core +1 more source
An Insider Threat Mitigation Framework Using Attribute Based Access Control [PDF]
Insider Threat is a significant and potentially dangerous security issue in corporate settings. It is difficult to mitigate because, unlike external threats, insiders have knowledge of an organization's access policies, access hierarchy, access protocols, and access scheduling.
arxiv
Towards A Generic Formal Framework for Access Control Systems [PDF]
There have been many proposals for access control models and authorization policy languages, which are used to inform the design of access control systems. Most, if not all, of these proposals impose restrictions on the implementation of access control systems, thereby limiting the type of authorization requests that can be processed or the structure ...
arxiv
Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation [PDF]
To securely control access to systems, the concept of Zero Trust has been proposed. Access Control based on Zero Trust concept removes implicit trust and instead focuses on evaluating trustworthiness at every access request by using contexts. Contexts are information about the entity making an access request like the user and the device status ...
arxiv