Results 61 to 70 of about 5,194,532 (200)

An evaluation of break-the-glass access control model for medical data in wireless sensor networks [PDF]

open access: yes, 2015
Wireless Sensor Networks (WSNs) have recently attracted a lot of attention in the research community because it is easy to deploy them in the physical environment and collect and disseminate environmental data from them.
Christianson, B.   +3 more
core   +1 more source

Security Analysis of Interaction between RBAC Model and Distributed Administrative Model

open access: yesБезопасность информационных технологий, 2011
This paper proposes a formal approach to security analysis of a RBAC model which specification contains a model of distributed administration for user role assignment. A high-level description of security verification algorithm is provided.
N. A. Semenova
doaj  

Ephemeral Secret Leakage-Free ID-Role-Based Access Control Authentication and Key Exchange Protocol for Securing Electric Vehicle Data

open access: yesIEEE Access
Role-based Access Control (RBAC) promises an efficient authorization management system in accessing resources including electric vehicle (EV) data stored in the cloud server.
Amang Sudarsono   +3 more
doaj   +1 more source

Design of an access control model based on meta-data and role for integrated information management system of coal mine and its implementatio

open access: yesGong-kuang zidonghua, 2014
Shortcomings of access control strategy in existing information management systems of coal mine were analyzed, and some views were pointed out that basic functions of account control strategy was simple in function and immutable in right during system ...
CHEN Yunqi, XU Ji
doaj   +1 more source

Authorization algorithms for permission-role assignments [PDF]

open access: yes, 2009
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments.
Sun, Lili, Wang, Hua, Yong, Jianming
core   +2 more sources

Implementation of Formal Semantics and the Potential of Non-Classical Logic Systems for the Enhancement of Access Control Models: A Literature Review [PDF]

open access: yesarXiv, 2023
This literature review discovers an implementation of formal logic systems in cyber security by enhancing access control models. We explore the characteristics of the existing access control theories, their limitations and how classical logic is used therein.
arxiv  

RelBAC: Relation Based Access Control [PDF]

open access: yes, 2008
TheWeb 2.0, GRID applications and, more recently, semantic desktop applications are bringing the Web to a situation where more and more data and metadata are shared and made available to large user groups. In this context, metadata may be tags or complex
Crispo, Bruno   +2 more
core   +1 more source

An Insider Threat Mitigation Framework Using Attribute Based Access Control [PDF]

open access: yesarXiv, 2023
Insider Threat is a significant and potentially dangerous security issue in corporate settings. It is difficult to mitigate because, unlike external threats, insiders have knowledge of an organization's access policies, access hierarchy, access protocols, and access scheduling.
arxiv  

Towards A Generic Formal Framework for Access Control Systems [PDF]

open access: yesarXiv, 2012
There have been many proposals for access control models and authorization policy languages, which are used to inform the design of access control systems. Most, if not all, of these proposals impose restrictions on the implementation of access control systems, thereby limiting the type of authorization requests that can be processed or the structure ...
arxiv  

Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation [PDF]

open access: yesarXiv, 2022
To securely control access to systems, the concept of Zero Trust has been proposed. Access Control based on Zero Trust concept removes implicit trust and instead focuses on evaluating trustworthiness at every access request by using contexts. Contexts are information about the entity making an access request like the user and the device status ...
arxiv  

Home - About - Disclaimer - Privacy