نتایج جستجو برای: rbac

تعداد نتایج: 769  

Journal: :International Journal of Secure Software Engineering 2011

Journal: :Network Protocols & Algorithms 2016
Dapeng Xiong Liang Chen

Access control technology protects the cloud from being accessed illegally. However, traditional access control method cannot meet the new demands of the cloud environment. In order to improve the deficiency of the current multi domain access control method in timeliness and flexibility. This paper puts forward a dynamic access control policy on the basis of task driving mechanism. The new meth...

2014
Edwin Okoampa Boadu Gabriel Kofi Armah

A key issue in any information security is to protect information about all forms against unauthorized access. Innovation access control model is now becoming a need for application on systems due to emerging acts. Role based access control (RBAC) is a feasible alternative to traditional Discretionary Access Control (DAC) and Mandatory Access Control (MAC). RBAC has been presented to be cost op...

2008
Zhixiong Zhang

SCALABLE ROLE & ORGANIZATION BASED ACCESS CONTROL AND ITS ADMINISTRATION Zhixiong Zhang, Ph.D. George Mason University, 2008 Dissertation Co-director: Dr. Ravi S. Sandhu Dissertation Co-director: Dr. Daniel Menascé In Role Based Access Control (RBAC), roles are typically created based on job functions inside an organization. Traditional RBAC does not scale up well for modeling security policies...

2008
Ravi Sandhu Venkata Bhamidipati

Role-based access control (RBAC) received serious academic attention in the early 1990’s, although traces of the underlying concepts had been in ad hoc commercial practise since the 1970’s. Through the 1990’s and 2000’s RBAC achieved remarkable success, and today is widely practised as the preferred form of access control. Adoption of the 2004 NIST/ANSI Standard RBAC Model [1] marks a maturity ...

2014
Safaà Hachana

Today’s corporations rely entirely on their information systems, usually connected to the Internet. Network access control, mainly ensured by firewalls, has become a paramount necessity. Yet, the management of manually configured firewall rules is complex, error prone, and costly for large networks. Using high abstract models such as the Role Based Access Control (RBAC) model has proved to be e...

2004
Mohammad Abdullah Al-Kahtani Ravi Sandhu Sushil Jajodia Edgar Sibley Kris Gaj Ravi S. Sandhu

A FAMILY OF MODELS FOR RULE-BASED USER-ROLE ASSIGNMENT Mohammad Abdullah Al-Kahtani, Ph.D. George Mason University, 2003 Dissertation Director: Dr. Ravi Sandhu Conventional role based access control (RBAC) was designed with closed-enterprise environment in mind where a security officer(s) manually assigns users to roles. However, today, an increasing number of service-providing enterprises make...

Journal: :International Journal of Engineering Applied Sciences and Technology 2020

2008

This document calls for a collaborative industry initiative to promote interoperability and standardsbased exchange of definition and operational controls for Role-Based Access Control (RBAC) systems. It outlines the use cases and critical need for increased standardization. This paper describes the types of delegated scope and control capabilities needed when autonomous systems share a common ...

2008
Jay Jarman James A. McCart Donald J. Berndt Jay Ligatti

Although Role-Based Access Control (RBAC) is a common security model currently, it has not been systematically applied in databases. In this paper, we propose a framework that enforces RBAC based on dynamic query rewriting. This framework grants privileges to data based on an intersection of roles, database structures, content, and privileges. All of this is implemented at the database level, w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید