نتایج جستجو برای: rbac

تعداد نتایج: 769  

2014
Su Yu Xiao Xiao Dong Yin Wang Ghassan M. Azar

Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received more attention. There exists a need for multilevel access control in these types of networks, in order to give authorization based on a node’s role – this is also called role-based access control (RBAC). SOD of RBAC is a good wa...

2003
Anthony Rhodes William Caelli

The essence of Role-Based Access Control (RBAC) is that system permissions are assigned to defined “roles” rather than to individual users. Users acquire these permissions by virtue of being authorised to act in a categorised manner known as a “role”. The driving motivation for RBAC is to simplify security policy administration while facilitating the definition of flexible, customised policies....

2003
Rafae Bhatti James B. D. Joshi Elisa Bertino Arif Ghafoor

Policy specification for securing Web services is fast emerging as a key research area due to rapid proliferation of Web services in modern day enterprise applications. Whilst the use of XML technology to support these Web services has resulted in their tremendous growth, it has also introduced a new set of security challenges specific to these Web services. Though there has been recent researc...

2012
Sonu Verma Suresh Kumar Manjeet Singh

As the demand for data and information management increases, there is also a critical need for maintaining the security of the databases, applications and information systems. Data and information have to be protected from unauthorized access as well as from malicious corruption. With the advent of the web it is even more important to protect data and information as numerous individuals have ac...

2011
Liang Chen Jason Crampton

The increasing need to share information in dynamic environments has created a requirement for risk-aware access control systems. The standard RBAC model is designed to operate in a relatively stable, closed environment and does not include any support for risk. In this paper, we explore a number of ways in which the RBAC model can be extended to incorporate notions of risk. In particular, we d...

2012
Nezar Nassr Eric Steegmans

Role-Based Access Control (RBAC) has become the de facto standard for realizing authorization requirements in a wide range of organizations. Existing RBAC models suffer from two main shortcomings; lack of expressiveness of roles/permissions and ambiguities of their hierarchies. Roles/permissions expressiveness is limited since roles do not have the ability to express behaviour and state, while ...

Journal: :Cybernetics and Information Technologies 2021

Abstract It this paper it is proposed a new access control model – Hybrid Role and Attribute Based Access Control (HRABAC). an extension of Role-Based (RBAC). HRABAC designed for information systems enterprise software combines the advantages RBAC Attribute-Based (ABAC). easy configurable, fine-grained supports role hierarchies. The describes scheme in Laravel package laravelroles/rolespermissi...

Journal: :Journal of Computer Security 2015

Journal: :JSW 2011
Jun Zheng Kun Qi Zhang Wen Shang Zheng An Yu Tan

With the rapid development of network and the coming of information age, access control is particularly important, role-based access control (RBAC) is an access control which is popular. RBAC authorizes and controls the roles corresponding to the users to operate the object. It solves problems of least privilege, separation of duties and so on. However, limited permissions are required to be ex...

2007
Faranak Farzad Eric S. K. Yu Patrick C. K. Hung

Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are granted to an individual based on her defined roles. Much work has been done on the specification of RBAC models for enforcing access control; however, in order to arrive at appropriate choices of access control for par...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید