نتایج جستجو برای: rbac

تعداد نتایج: 769  

Journal: :International Journal of Advances in Scientific Research and Engineering 2019

Journal: :Jurnal Ilmiah Komputasi 2022

Aplikasi Sistem Informasi Aparatur Sipil Negara adalah aplikasi yang mengelola selu- ruh tahapan manajemen kepagawaian aparatur sipil negara, sejalan dengan perkembangan teknologi dan kebutuhan negara akan data digital, maka perlu dilakukan pengembangan. terdapat 18 pengembangan salah satunya pada fungsi user. Adapun permasalahan ada tersebut yaitu user memiliki role cukup banyak, dimana 1 bisa...

2002
András Belokosztolszki David Eyers

OASIS is a distributed RBAC implementation with many extensions. Sound policy design will permit OASIS to protect the distributed resources whose access privileges it controls. However, through operating in a distributed environment, the underlying OASIS infrastructure is open to a number of potential attacks. This paper identifies three main classes of such attack and introduces techniques to ...

2007
Alessandro Bozzon Tereza Iofciu Wolfgang Nejdl Antonio Vincenzo Taddeo Sascha Tönnies

Search engine-based features are a basic interaction mean for users to find information inside a Web-based Learning Management Systems (LMS); nonetheless, traditional solutions lack in mechanisms for access rights management for data contained in search engines’ indexes. This paper explores the integration of a Role Based Access Control (RBAC) mechanism for the interaction with a search engine ...

2012
Arjmand Samuel Hammad Haseeb Arif Ghafoor Elisa Bertino

Arjmand Samuel, Hammad Haseeb, Arif Ghafoor and Elisa Bertino Abstract Cyber Physical Systems (CPS) are complex systems that operate in a dynamic environment where security characteristics of contexts are unique, and uniform access to secure resources anywhere anytime to mobile entities poses daunting challenges. To capture context parameters such as location and time in an access control polic...

2005
Luciana A M Zaina Graça Bressan Clóvis T Fernandes Wilson V Ruggiero

Nowadays, the development of robust educational systems has been a reality thus provoking great efforts to control users’ access in these systems. Besides, an educational system has mutable tasks, changing users’ permissions and consequently limitations are generated in the system security. The main feature of RBAC (Role Based Access Control) is that permissions are associated with roles, and a...

2007
Ignacio Aedo Paloma Díaz Daniel Sanz

One of the main design challenges of any Web-based Emergency Management Information System (WEMIS) is the diversity of users and responsibilities to be considered. Modelling the access capabilities of different communities of users is a most relevant concern for which the RBAC (Role-Based Access Control) paradigm provides flexible and powerful constructs. In this paper we describe how we used a...

2007
Clara Bertolissi Maribel Fernández Steve Barker

Despite the widespread adoption of Role-based Access Control (RBAC) models, new access control models are required for new applications for which RBAC may not be especially well suited and for which implementations of RBAC do not enable properties of access control policies to be adequately defined and proven. To address these issues, we propose a form of access control model that is based upon...

2006
ANDREAS MATTAS IOANNIS MAVRIDIS CHRISTOS ILIOUDIS IOANNIS PAGKALOS

Today’s web-based collaborative applications need new approaches to overcome the shortcomings of classical access control. The limitations on administrative aspects of the existing security models and the requirements for more efficient management of authorizations in order to provide fine-grained and just-in-time access control for collaborative applications are discussed in this paper. The pr...

Journal: :CoRR 2011
Antonio Tapiador Diego Carrera Joaquín Salvachúa

This paper explores the application of role-based access control to social networks, from the perspective of social network analysis. Each tie, composed of a relation, a sender and a receiver, involves the sender's assignation of the receiver to a role with permissions. The model is not constrained to system-defined relations and lets users define them unilaterally. It benefits of RBAC's advant...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید