Results 71 to 80 of about 5,194,532 (200)

Security analysis for temporal role based access control [PDF]

open access: yes, 2014
Providing restrictive and secure access to resources is a challenging and socially important problem. Among the many formal security models, Role Based Access Control (RBAC) has become the norm in many of today's organizations for enforcing security. For
Atluri, Vijayalakshmi   +6 more
core   +1 more source

Trustworthy AI: Securing Sensitive Data in Large Language Models

open access: yesAI
Large language models (LLMs) have transformed Natural Language Processing (NLP) by enabling robust text generation and understanding. However, their deployment in sensitive domains like healthcare, finance, and legal services raises critical concerns ...
Georgios Feretzakis   +1 more
doaj   +1 more source

A Model-driven Role-based Access Control for SQL Databases

open access: yesComplex Systems Informatics and Modeling Quarterly, 2015
Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users.
Raimundas Matulevičius, Henri Lakk
doaj   +1 more source

Traffic Prediction and Random Access Control Optimization: Learning and Non-learning based Approaches [PDF]

open access: yesarXiv, 2020
Random access schemes in modern wireless communications are generally based on the framed-ALOHA (f-ALOHA), which can be optimized by flexibly organizing devices' transmission and re-transmission. However, this optimization is generally intractable due to the lack of information about complex traffic generation statistics and the occurrence of the ...
arxiv  

A Novel Role-based Access Control Model in Cloud Environments

open access: yesInternational Journal of Computational Intelligence Systems, 2016
In Cloud environments, the relationship between resources and users is more ad hoc and dynamic. The role-based access control (RBAC) model is an appropriate access control model for Cloud environments.
Jun Luo   +3 more
doaj   +1 more source

Report on the Survey of Role-Based Access Control (RBAC) in Practice [PDF]

open access: yes, 2012
From literature study, we collected: (a) a set of core features of the RBAC model, according to the ANSI/INCITS 359:2004 RBAC standard, (b) implicit assumptions, (c) a set of strengths, and (d) a set of phenomena which may limit these strengths in ...
Condori-Fernándezand, Nelly   +2 more
core   +1 more source

Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service

open access: yes, 2016
Database as a service provides services for accessing and managing customers data which provides ease of access, and the cost is less for these services. There is a possibility that the DBaaS service provider may not be trusted, and data may be stored on
E Bertino   +3 more
core   +1 more source

Role-Based Access Controls [PDF]

open access: yes15th National Computer Security Conference, Baltimore, MD. October 13-16, 1992, 2009
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many ...
arxiv  

Role-Based Access-Control for Databases [PDF]

open access: yes, 2012
Liikudes üha enam paberivaba ari suunas, hoitakse üha enam tundlikku informatsiooni andmebaasides. Sellest tulenevalt on andmebaasid ründajatele väärtuslik sihtmärk.
Lakk, Henri
core  

Trust Management in Decentralized IoT Access Control System [PDF]

open access: yesarXiv, 2019
Heterogeneous and dynamic IoT environments require a lightweight, scalable, and trustworthy access control system for protection from unauthorized access and for automated detection of compromised nodes. Recent proposals in IoT access control systems have incorporated blockchain to overcome inherent issues in conventional access control schemes ...
arxiv  

Home - About - Disclaimer - Privacy