نتایج جستجو برای: media access control

تعداد نتایج: 1852182  

2005
Martín Abadi Andrew Birrell Ted Wobber

We describe a new design for authentication and access control. In this design, principals embody a flexible notion of authentication. They are compound principals that reflect the identities of the programs that have executed, even those of login programs. These identities are based on a naming tree. Our access control lists are patterns that recognize principals. We show how this design suppo...

Journal: :Computing Systems 1992
Luis-Felipe Cabrera Allen Luniewski James W. Stamos

tüe believe that access controls for object-oriented systems should be fine-grained and thus apply to individual methods of individual objects. The efficient support of fine-grained access control is challenging because a check is done on every method invo-cation. rüe present a design that uses access control lists (ACLs) and exploits virtual memory facilities to make these checks run fast. The...

2015
Qasim Mahmood Rajpoot Christian Damsgaard Jensen Ram Krishnan

Role-based access control (RBAC) and attribute-based access control (ABAC) are currently the most prominent access control models. However, they both suffer from limitations and have features complimentary to each other. Due to this fact, integration of RBAC and ABAC has become a hot area of research recently. We propose an access control model that combines the two models in a novel way in ord...

Journal: :CoRR 2010
Ali Hosseini Mohammad Abdollahi Azgomi

Among access control models, Role-Based Access Control (RBAC) is very useful and is used in many computer systems. Static Combination of Duty (SCD) and Dynamic Combination of Duty (DCD) constraints have been introduced recently for this model to handle dependent roles. These roles must be used together and can be considered as a contrary point of conflicting roles. In this paper, we propose sev...

1999
Gregory Tassey Michael P. Gallaher D. Alan C. O ’ Connor B. A. Brian Kropp D.

2005
Yanhong A. Liu Scott D. Stoller

This paper describes a simplified and corrected specification of role-based access control (RBAC) based on the specification in the ANSI standard for RBAC. The simplifications and corrections were made while following a systematic method for deriving efficient implementations from straightforward implementations of clear specifications. The method allows specifications to be written clearly wit...

2007
Limin Ao Wei Zhou Xiaodong Zhu

A temporarily-spatially constrained model based on TRBAC (Task-Role Based Access Control) is proposed in workflow system. Temporary and spatial Constraint is that user is not only constrained by temporality, but also constrained by spatiality when user executes the task. The model suggests that a property of security level should be increased in task. The newly increased property can make the w...

2000
Apu Kapadia Jalal Al-Muhtadi Roy H. Campbell M. Dennis Mickunas

The secure interaction between two or more administrative domains is a major concern. We examine the issues of secure interoperability between two security domains operating under the Role Based Access Control (RBAC) Model. We propose a model that quickly establishes a exible policy for dynamic role translation. The role hierarchies of the local and foreign domains can be manipulated through ou...

2005
Yanhong A. Liu Scott D. Stoller

This paper describes a corrected and simplified specification of role-based access control (RBAC) based on the specification in the ANSI standard for RBAC. We give a complete specification of core RBAC, explaining the methodology we used in developing it; we then give a complete specification of hierarchical RBAC, with an additional option for managing the relationship on roles; and we also des...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید