نتایج جستجو برای: rbac

تعداد نتایج: 769  

2011
Anne Baumgraß Thomas Baier Jan Mendling Mark Strembeck

A process-aware information system (PAIS) is a software system that supports the definition, execution, and analysis of business processes. The execution of process instances is typically recorded in so called event logs. In this paper, we present an approach to automatically generate LTL (Linear Temporal Logic) statements from process-related RBAC (Role-based Access Control) models. These LTL ...

2004
Alessandro Ricci Mirko Viroli Andrea Omicini

Access control is a main security issue in the management of complex information systems as well as Multi-agent Systems (MAS). In this paper we discuss the application of the Role-Based Access Control (RBAC) model in the context of TuCSoN coordination infrastructure for MAS. RBAC models and their extensions are currently considered the most effective approach for engineering access control in c...

2015
Lars Hamann Karsten Sohr Martin Gogolla

Role-based access control (RBAC) is widely used in organizations for access management. While basic RBAC concepts are present in modern systems, such as operating systems or database management systems, more advanced concepts like history-based separation of duty are not. In this work, we present an approach that validates advanced organizational RBAC policies using a model-based approach again...

Journal: :J. Network and Computer Applications 2001
Gail-Joon Ahn Kwangjo Kim

In role-based access control (RBAC), permissions are associated with roles and users are made members of appropriate roles, thereby acquiring the roles’ permissions. The principal motivation behind RBAC is to simplify administration. In this paper, we investigate one aspect of RBAC administration concerning assignment of users to roles. We introduce a constrained user-role assignment model, cal...

Journal: :Computing and Informatics 2012
Ilia Yastrebov Natalia Yastrebova

The distributed control system of the Large Hadron Collider (LHC) presents many challenges due to its inherent heterogeneity and highly dynamic nature. One critical challenge is providing access control guarantees within the middleware. Role-based access control (RBAC) is a good candidate to provide access control. However, in an equipment control system transactions are often dependent on user...

Journal: :Journal of Computer Security 2006
Chiara Braghin Daniele Gorla Vladimiro Sassone

Rôle-based access control (RBAC) is increasingly attracting attention because it reduces the complexity and cost of security administration by interposing the notion of rôle in the assignment of permissions to users. In this paper, we present a formal framework relying on an extension of the π-calculus to study the behaviour of concurrent systems in a RBAC scenario. We define a type system ensu...

2009
Khaled Gaaloul François Charoy

e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined st...

1997
D. Richard Kuhn

Role based access control (RBAC) is attracting increasing attention as a security mechanism for both commercial and many military systems. Much of RBAC is fundamentally diierent from multi-level security (MLS) systems, and the properties of RBAC systems have not been explored formally to the extent that MLS system properties have. This paper explores some aspects of mutual exclusion of roles as...

Journal: :Molecules 2023

This study investigated the effects of a modified rice bran arabinoxylan compound (RBAC) as dietary supplement on gut microbiota healthy adults. Ten volunteers supplemented their diet with 1 g RBAC for six weeks and 3 another weeks, three-week washout period. Faecal samples were collected every over 21 weeks. Microbiota from faecal profiled using 16S rRNA sequencing. Assessment alpha beta diver...

2006
Wei Shi

This thesis intends to develop application-level access control models to address several major security issues in enterprise environments. The first goal is to provide simple and efficient authorization specifications to reduce the complexity of security management. The second goal is to provide dynamic access control for Web service applications. The third goal is to provide an access control...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید