نتایج جستجو برای: access control
تعداد نتایج: 1607635 فیلتر نتایج به سال:
abstract listening is a key and main tool in second language skill and its development is of prime concern to teachers and learners. furthermore, the application of technology in language classrooms has become more commonplace in the last fifty years. computer and the internet have made foreign language materials easy to access and use. so, the present study is an attempt to examine the effec...
The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to generically enforce policy persists. While researchers, practitioners and policy makers have specified a large variety of access control policies to address re...
Recently, there has been considerable interest in attribute based access control (ABAC) to overcome the limitations of the dominant access control models (i.e, discretionary-DAC, mandatory-MAC and role based-RBAC) while unifying their advantages. Although some proposals for ABAC have been published, and even implemented and standardized, there is no consensus on precisely what is meant by ABAC ...
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general enough to simulate the traditional methods. In this paper we provide systematic constructions for various common forms of both of the tradition...
Institutional collaborative systems focus on providing the fast, and secure connections to students, teaching and non-teaching staff members. Access control is more important in these types of systems because different kind of users access the system on different levels. So a proper architecture must be there for these kinds of systems, for providing an efficient and secure system. As lot of wo...
The traditional manual way of thesis management is increasingly satisfying the demand of thesis guidance and administrative management in the information age. To improve the traditional manual undergraduate thesis writing, guidance and administrative management process in Southwest University of China, a Role-based access control (RBAC) Workflow model for thesis management is developed. In the ...
Delegation in access control takes place in the presence of an access control model, when a user is unable to perform their administratively assigned permissions. In this paper, we discuss the meanings of the word “delegation” found in the literature, focusing on its use in access control. In the context of a rolebased access control model, we survey many possible ways in which delegation can b...
Attribute-based access control (ABAC) and role-based access control (RBAC) are currently the two most popular access control models. Yet, they both have known limitations and offer features complimentary to each other. Due to this fact, integration of RBAC and ABAC has recently emerged as an important area of research. In this paper, we propose an access control model that combines the two mode...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید