نتایج جستجو برای: rbac
تعداد نتایج: 769 فیلتر نتایج به سال:
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received more attention. There exists a need for multilevel access control in these types of networks, in order to give authorization based on a node’s role – this is also called role-based access control (RBAC). SOD of RBAC is a good wa...
The essence of Role-Based Access Control (RBAC) is that system permissions are assigned to defined “roles” rather than to individual users. Users acquire these permissions by virtue of being authorised to act in a categorised manner known as a “role”. The driving motivation for RBAC is to simplify security policy administration while facilitating the definition of flexible, customised policies....
Policy specification for securing Web services is fast emerging as a key research area due to rapid proliferation of Web services in modern day enterprise applications. Whilst the use of XML technology to support these Web services has resulted in their tremendous growth, it has also introduced a new set of security challenges specific to these Web services. Though there has been recent researc...
As the demand for data and information management increases, there is also a critical need for maintaining the security of the databases, applications and information systems. Data and information have to be protected from unauthorized access as well as from malicious corruption. With the advent of the web it is even more important to protect data and information as numerous individuals have ac...
The increasing need to share information in dynamic environments has created a requirement for risk-aware access control systems. The standard RBAC model is designed to operate in a relatively stable, closed environment and does not include any support for risk. In this paper, we explore a number of ways in which the RBAC model can be extended to incorporate notions of risk. In particular, we d...
Role-Based Access Control (RBAC) has become the de facto standard for realizing authorization requirements in a wide range of organizations. Existing RBAC models suffer from two main shortcomings; lack of expressiveness of roles/permissions and ambiguities of their hierarchies. Roles/permissions expressiveness is limited since roles do not have the ability to express behaviour and state, while ...
Abstract It this paper it is proposed a new access control model – Hybrid Role and Attribute Based Access Control (HRABAC). an extension of Role-Based (RBAC). HRABAC designed for information systems enterprise software combines the advantages RBAC Attribute-Based (ABAC). easy configurable, fine-grained supports role hierarchies. The describes scheme in Laravel package laravelroles/rolespermissi...
With the rapid development of network and the coming of information age, access control is particularly important, role-based access control (RBAC) is an access control which is popular. RBAC authorizes and controls the roles corresponding to the users to operate the object. It solves problems of least privilege, separation of duties and so on. However, limited permissions are required to be ex...
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are granted to an individual based on her defined roles. Much work has been done on the specification of RBAC models for enforcing access control; however, in order to arrive at appropriate choices of access control for par...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید