نتایج جستجو برای: role based access control

تعداد نتایج: 5076952  

Journal: :Int. J. Web Service Res. 2004
Harry J. Wang Hsing Kenneth Cheng J. Leon Zhao

With the dramtic expansion of global e-markets, companies collaborate more and more in order to streamline their supply chains. Companies often form coalitions to reach the critical mass required to bid on a large volume or wide ranges of products. Meanwhile, they also compete with one another for market shares. Because of the complex relationships among companies, controlling the access to sha...

2002
Javier Lopez Antonio Maña Mariemma Inmaculada Yagüe del Valle

The use of attribute certificates and the concept of mobile policies have been proposed to overcome some of the limitations of the role based access control (RBAC) paradigm and to implement security requirements such as the “originator controlled” (ORCON) policy. Mobile policies are attached to the data that they control and enforced by their execution in trusted servers. In this paper we exten...

2007
M. A. C. Dekker Sandro Etalle

Flexibility of management is an important requisite for access control systems as it allows users to adapt the access control system in accordance with practical requirements. This paper builds on earlier work where we defined administrative policies for a general class of RBAC models. We present a formal definition of administrative refinement and we show that there is an ordering for administ...

2011
ANDREAS MATTAS IOANNIS MAVRIDIS CHRISTOS ILIOUDIS IOANNIS PAGKALOS

Access control administration regulates and enforces the definition of the components of an access control system by authorized administrative users. In this paper, the limitations on administrative aspects of well-known security models are addressed and the requirements for efficient management of authorizations are investigated in order to provide fine-grained and just-in-time access control ...

2000
Andreas Schaad Jonathan Moffett Jeremy Jacob

Research in the area of role-based access control has made fast progress over the last few years. However, little has been done to identify and describe existing role-based access control systems within large organisations. This paper describes the access control system of a major European Bank. An overview of the system’s structure, its administration and existing control principles constraini...

2014
Luigi Logrippo

Some logic definitions for access control and data flow control models are proposed. A formalization of concepts of confidentiality and integrity is provided, on the basis of predicates CanKnow and CanStore. The application of these concepts to several well-known access control models, including MultiLevel Systems, Role-Based Access Control, Chinese Wall is shown. Formal definitions and proofs ...

1998
W. A. Jansen

Role Based Access Control (RBAC) refers to a class of security mechanisms that mediate access to resources through organizational identities called roles. A number of models have been published [1, 2 ,3] that formally describe the basic properties of RBAC. One feature of these models is the notion of a role hierarchy, which represents the relationship among roles that are defined in terms of ot...

2005
Hyung Chan Kim R. S. Ramakrishna Kouichi Sakurai Wook Shin

The increasing development of distributed application has led to the widespread involvement of database interconnection. Information sharing through the interconnection requires a new type of access control beyond local-only access control scheme: we need to consider the relationship among organizations and a collaborative application. In this paper, we describe an access control framework for ...

2013
You Peng Yan Song Hang Ju YanZhang Wang

Following the emergency of multi-level, complex and distributed information systems, the traditional RBAC model becomes more and more weak and incompetent. Currently, the research of RBAC model mainly focused on building a suitable role hierarchy, although played a certain effect it still have many problems. Through the research aiming at organizations and their characters, we believe that the ...

Journal: :IJMDEM 2014
Min Chen

In this paper, the author proposes a hierarchical security model (HSM) to enhance security assurance for multimedia big data. It provides role hierarchy management and security roles/rules administration by seamlessly integrating the role-based access control (RBAC) with the object-oriented concept, spatio-temporal constraints, and multimedia standard MPEG-7. As a result, it can deal with chall...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید