Translating Role-Based Access Control Policy within Context
نویسندگان
چکیده
منابع مشابه
A semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملDisease Control Priorities Third Edition Is Published: A Theory of Change Is Needed for Translating Evidence to Health Policy
How can evidence from economic evaluations of the type the Disease Control Priorities project have synthesized be translated to better priority setting? This evidence provides insights into how investing in health, particularly though priority interventions and expanded access to health insurance and prepaid care, can not only save lives but also help alleviate poverty and provide financial ris...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملEnhanced Context Aware Role Based Access Control Framework for Pervasive Environment
Utilization of contextual information considered very useful for improving access decision making process against systems resources, to be more effective in providing authorized service for a large number of end users.We selected model makes decisions based on context information sensed and collected from user environment. Then we enhanced context utilization and framework performance based on ...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کامل