Research on Improved Access Control Model Based on T-RBAC
نویسندگان
چکیده
منابع مشابه
mortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولXGSP-RBAC: Access Control Mechanism based on RBAC Model in Ubiquitous Collaboration System
With the advances in a variety of software/hardware technologies and wireless networking, there is coming a need for ubiquitous collaboration which allows people to access information systems independent of their access device and their physical capabilities and to communicate with other people in anytime and anywhere. Current virtual conferencing systems lack support for ubiquitous collaborati...
متن کاملT-RBAC based Multi-domain Access Control Method in Cloud
Access control technology protects the cloud from being accessed illegally. However, traditional access control method cannot meet the new demands of the cloud environment. In order to improve the deficiency of the current multi domain access control method in timeliness and flexibility. This paper puts forward a dynamic access control policy on the basis of task driving mechanism. The new meth...
متن کاملuT-RBAC: Ubiquitous Role-Based Access Control Model
In ubiquitous environment that users access resource anytime and anywhere, access control model should consider user’s location information. The proposed uT-RBAC includes the location information for user’s least privilege. It also supports time related information, which enables the access control model to accommodate various ubiquitous environments. The proposed uT-RBAC can be dynamically app...
متن کاملA New RBAC Based Access Control Model for Cloud Computing
Access Control is an important component of Cloud Computing; specially, User access control management; however, Access Control in Cloud environment is different from traditional access environment and using general access control model can’t cover all entities within Cloud Computing, noting that Cloud environment includes different entities such as data owner, end user, and service provider. I...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2020
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/1453/1/012011