نتایج جستجو برای: rbac
تعداد نتایج: 769 فیلتر نتایج به سال:
Access control technology protects the cloud from being accessed illegally. However, traditional access control method cannot meet the new demands of the cloud environment. In order to improve the deficiency of the current multi domain access control method in timeliness and flexibility. This paper puts forward a dynamic access control policy on the basis of task driving mechanism. The new meth...
A key issue in any information security is to protect information about all forms against unauthorized access. Innovation access control model is now becoming a need for application on systems due to emerging acts. Role based access control (RBAC) is a feasible alternative to traditional Discretionary Access Control (DAC) and Mandatory Access Control (MAC). RBAC has been presented to be cost op...
SCALABLE ROLE & ORGANIZATION BASED ACCESS CONTROL AND ITS ADMINISTRATION Zhixiong Zhang, Ph.D. George Mason University, 2008 Dissertation Co-director: Dr. Ravi S. Sandhu Dissertation Co-director: Dr. Daniel Menascé In Role Based Access Control (RBAC), roles are typically created based on job functions inside an organization. Traditional RBAC does not scale up well for modeling security policies...
Role-based access control (RBAC) received serious academic attention in the early 1990’s, although traces of the underlying concepts had been in ad hoc commercial practise since the 1970’s. Through the 1990’s and 2000’s RBAC achieved remarkable success, and today is widely practised as the preferred form of access control. Adoption of the 2004 NIST/ANSI Standard RBAC Model [1] marks a maturity ...
Today’s corporations rely entirely on their information systems, usually connected to the Internet. Network access control, mainly ensured by firewalls, has become a paramount necessity. Yet, the management of manually configured firewall rules is complex, error prone, and costly for large networks. Using high abstract models such as the Role Based Access Control (RBAC) model has proved to be e...
A FAMILY OF MODELS FOR RULE-BASED USER-ROLE ASSIGNMENT Mohammad Abdullah Al-Kahtani, Ph.D. George Mason University, 2003 Dissertation Director: Dr. Ravi Sandhu Conventional role based access control (RBAC) was designed with closed-enterprise environment in mind where a security officer(s) manually assigns users to roles. However, today, an increasing number of service-providing enterprises make...
This document calls for a collaborative industry initiative to promote interoperability and standardsbased exchange of definition and operational controls for Role-Based Access Control (RBAC) systems. It outlines the use cases and critical need for increased standardization. This paper describes the types of delegated scope and control capabilities needed when autonomous systems share a common ...
Although Role-Based Access Control (RBAC) is a common security model currently, it has not been systematically applied in databases. In this paper, we propose a framework that enforces RBAC based on dynamic query rewriting. This framework grants privileges to data based on an intersection of roles, database structures, content, and privileges. All of this is implemented at the database level, w...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید