نتایج جستجو برای: rbac

تعداد نتایج: 769  

Journal: :Journal of Advances in Computer Networks 2018

2012
Vladimir Oleshchuk V. Oleshchuk

Role Based Access Control (RBAC) Model has been found to be quite useful and has drawn a lot of research interest over the last fifteen years. It was recently defined as NIST/ANSI Standard. Traditional RBAC considers user to role as well as role to permission assignments to be static in nature with respect to space and time. However it was observed that in the context of mobile applications, sp...

Journal: : 2021

U ovom radu će biti opisan sistem za dinamičko generisanje komponenti na korisničkoj strani veb aplikacije implementiranoj korišćenjem React radnog okvira i RBAC kontrole pristupa.

Journal: :Int. J. Computational Intelligence Systems 2016
Jun Luo Hongjun Wang Xun Gong Tianrui Li

In Cloud environments, the relationship between resources and users is more ad hoc and dynamic. The role-based access control (RBAC) model is an appropriate access control model for Cloud environments. When using the RBAC model in Cloud environments, some new elements should be considered. This paper proposes a SAT-RBAC model (security and availability based trust relationship in RBAC) and adop...

Journal: :IJISP 2013
Ousmane Amadou Dia Csilla Farkas

The authors propose a business-oriented approach to support accurate and dynamic user-role assignments for the Role Based Access Control (RBAC) model. Their model, called Business-Driven Role Based Access Control (BD-RBAC), is composed of three layers. The first layer extends the RBAC model with the concepts of business roles, system roles, credentials, and users’ capabilities. The second layer...

2014
Óscar Mortágua Pereira Diogo Domingues Regateiro Rui L. Aguiar

In database applications, access control is aimed at supervising users’ requests to access sensitive data. Users’ requests are mainly formalized by Create, Read, Update and Delete (CRUD) expressions. The supervision process can be formalized at a high level, such as based on the RBAC model, but in the end the relevant aspect is the data being accessed through each CRUD expression. In critical d...

Journal: :Inf. Syst. 2007
Jacques Wainer Akhil Kumar Paulo Barthelmess

One reason workflow systems have been criticized as being inflexible is that they lack support for delegation. This paper shows how delegation can be introduced in a workflow system by extending the role-based access control (RBAC) model. The current RBAC model is a security mechanism to implement access control in organizations by allowing users to be assigned to roles and privileges to be ass...

Journal: :Computer Communications 2000
Along Lin R. Brown

In this paper, the approaches to introducing security policy into Role-Based Access Control (RBAC) and the Common Data Security Architecture (CDSA) are proposed. We apply security policy to a role’s privileges in RBAC. The extended CDSA supports user-definable trust policy enforcement. Furthermore, a policy description language is discussed.

2009
Radu CONSTANTINESCU

The paper focuses on role engineering which is an important topic in the development of access control system, particularly when considering Role Based Access Control – RBAC models. Despite the wide use of RBAC in various applications, the role engineering process is not a standardized approach. The paper aims to define a methodology and a process model for role engineering.

Journal: :Journal of Computer Security 2014
Emre Uzun Vijayalakshmi Atluri Jaideep Vaidya Shamik Sural Anna Lisa Ferrara Gennaro Parlato P. Madhusudan

Providing restrictive and secure access to resources is a challenging and socially important problem. Among the many formal security models, Role Based Access Control (RBAC) has become the norm in many of today’s organizations for enforcing security. For every model, it is necessary to analyze and prove that the corresponding system is secure. Such analysis helps understand the implications of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید