نتایج جستجو برای: access control

تعداد نتایج: 1607635  

Journal: :Softw., Pract. Exper. 2005
Sacha Brostoff M. Angela Sasse David W. Chadwick Jim Cunningham Uche M. Mbanaso Sassa Otenko

An access control policy writing tool for the PERMIS role-based privileges management infrastructure was iteratively developed employing usability principles and techniques. Expert and intermediate users’ efficiency in policy creation was improved. Three novice users took part in a usability trial with the first prototype, attempting to recreate a simple policy in 15 minutes that had been speci...

Journal: :Computer and Information Science 2009
Chungen Xu Sheng Gong

Role-based access control(RBAC) is a promising technology for managing and enforcing security in large-scale enterprise-wide system, and we were motivated by the need to manage and enforce the strong access control technology of RBAC in large-scale Web environments. Majority of traditional access control models were passive data-protections, which were not suitable for large and complex multi-u...

Journal: :CoRR 2014
Muralikrishnan Ramane Balaji Vasudevan Sathappan Allaphan

In an organization specifically as virtual as cloud there is need for access control systems to constrain users direct or backhanded action that could lead to breach of security. In cloud, apart from owner access to confidential data the third party auditing and accounting is done which could stir up further data leaks. To control such data leaks and integrity, in past several security policies...

2002
Andrew D. Marshall

In this paper we describe a mainframe access control system (DENT) and its associated delegated administration tool (DSAS) that were used in a financial institution for over 20 years to control access to banking transaction products. The first part of this paper describes the design and operation of DENT/DSAS as an example of a long-lived access control system in a financial institution. A stan...

Journal: :CoRR 2017
Zachary S. Bischof Fabián E. Bustamante Nick Feamster

In this paper, we empirically demonstrate the growing importance of reliability by measuring its effect on user behavior. We present an approach for broadband reliability characterization using data collected by many emerging national initiatives to study broadband and apply it to the data gathered by the Federal Communications Commission’s Measuring Broadband America project. Motivated by our ...

Journal: :JSW 2011
Ying Xiao Xuange Peng

A soft linen emulsion rate intelligent control system based on the domain interpolation algorithm with self adjusting is introduced. In the hemp textile industry, soft linen deal processes can directly affect its following process. We take the lead to use the fuzzy control method applied in soft linen emulsion rate of Intelligent Control System. In the research process, the improvement of produ...

Journal: :J. Inf. Sci. Eng. 2006
Cungang Yang Chang Nian Zhang

In this paper, a practical method that can be employed to manage security policies using the eXtensible Markup Language (XML) is presented. The method efficiently administrates security policies based on the object oriented role-based access control model (ORBAC). Moreover, an information flow analysis technique is introduced for checking whether or not a created XML-based ORBAC security policy...

2014
Daniel Servos Sylvia L. Osborn

Attribute-based access control (ABAC) is a promising alternative to traditional models of access control (i.e. discretionary access control (DAC), mandatory access control (MAC) and role-based access control (RBAC)) that is drawing attention in both recent academic literature and industry application. However, formalization of a foundational model of ABAC and large scale adoption are still lack...

B. Tork Ladani B. Zamani M. Safarzadeh M. Taghizadeh

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

2013
Indrajit Ray

Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in a cloud environment. Accessing subjects may dynamically change, resources requiring protection may be created or modified, and subject access requirements to resources may change during the course of the application execution. Users may need to acquire different permissions from different administrative...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید