نتایج جستجو برای: abac

تعداد نتایج: 142  

Journal: :International Research Journal on Advanced Science Hub 2023

In this modern world, data is getting more significant with new emerging tech- nologies, and a transparent system must be made security mechanisms.For example, an Electronic Health Record (EHR) that records patient in digital format across different healthcare settings. The ulti- mate benefits of Blockchain technology are to safeguard pave path for health centers, clinics, medicals. A high-leve...

2012
David W Chadwick Christopher Bailey Rogério de Lemos

We describe the self-adaptive authorization framework (SAAF), an autonomic self-adapting system for federated RBAC/ABAC authorization infrastructures. SAAF monitors the behaviour of users, and when it detects abnormal behaviour, it responds by adapting the authorization infrastructure to prevent any further abnormal behaviour. The models and components of SAAF are described, as well as the curr...

Journal: :IEEE Transactions on Dependable and Secure Computing 2022

With the rapid advances in computing and information technologies, traditional access control models have become inadequate terms of capturing fine-grained, expressive security requirements newly emerging applications. An attribute-based (ABAC) model provides a more flexible approach to addressing authorization needs complex dynamic systems. While organizations are interested employing newer mo...

Journal: :J. Network and Computer Applications 2009
Deqing Zou Ligang He Hai Jin Xueguang Chen

(ABAC) mechanisms are gaining in popularity while the role-based access control (RBAC) mechanism is widely accepted as a general mechanism for authorization management. This paper proposes a new access control model, CRBAC, which aims to combine the advantages of RBAC and ABAC, and integrates all kinds of constraints into the RBAC model. Unlike other work in this area, which only incorporates o...

2012
Matthias Beckerle Leonardo A. Martucci Sebastian Ries Max Mühlhäuser

Nowadays the majority of users are unable to properly configure security mechanisms mostly because they are not usable for them. To reach the goal of having usable security mechanisms, the best solution is to minimize the amount of user interactions and simplify configuration tasks. Automation is a proper solution for minimizing the amount of user interaction. Fully automated security systems a...

Journal: :IEEE Internet of Things Journal 2021

Efficient and reliable access control in smart cities is critical for the protection of various resources decision making task execution. Existing centralized schemes suffer from limitations single point failure, low reliability, poor scalability. This article, therefore, proposes a distributed framework by combining blockchain contract technology attribute-based (ABAC) model. The consists one ...

Journal: :EURASIP J. Information Security 2009
Shuiming Ye Ying Luo Jian Zhao Sen-Ching S. Cheung

Access control systems using the latest biometric technologies can offer a higher level of security than conventional passwordbased systems. Their widespread deployments, however, can severely undermine individuals’ rights of privacy. Biometric signals are immutable and can be exploited to associate individuals’ identities to sensitive personal records across disparate databases. In this paper,...

2009
Haibo Shen

Web service is a new service-oriented computing paradigm which poses the unique security challenges due to its inherent heterogeneity, multidomain characteristic and highly dynamic nature. A key challenge in Web services security is the design of effective access control schemes. Attribute-based access control (ABAC) is more appropriate than some other access control mechanisms, but it do not f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید