نتایج جستجو برای: abac
تعداد نتایج: 142 فیلتر نتایج به سال:
In this modern world, data is getting more significant with new emerging tech- nologies, and a transparent system must be made security mechanisms.For example, an Electronic Health Record (EHR) that records patient in digital format across different healthcare settings. The ulti- mate benefits of Blockchain technology are to safeguard pave path for health centers, clinics, medicals. A high-leve...
We describe the self-adaptive authorization framework (SAAF), an autonomic self-adapting system for federated RBAC/ABAC authorization infrastructures. SAAF monitors the behaviour of users, and when it detects abnormal behaviour, it responds by adapting the authorization infrastructure to prevent any further abnormal behaviour. The models and components of SAAF are described, as well as the curr...
With the rapid advances in computing and information technologies, traditional access control models have become inadequate terms of capturing fine-grained, expressive security requirements newly emerging applications. An attribute-based (ABAC) model provides a more flexible approach to addressing authorization needs complex dynamic systems. While organizations are interested employing newer mo...
(ABAC) mechanisms are gaining in popularity while the role-based access control (RBAC) mechanism is widely accepted as a general mechanism for authorization management. This paper proposes a new access control model, CRBAC, which aims to combine the advantages of RBAC and ABAC, and integrates all kinds of constraints into the RBAC model. Unlike other work in this area, which only incorporates o...
Nowadays the majority of users are unable to properly configure security mechanisms mostly because they are not usable for them. To reach the goal of having usable security mechanisms, the best solution is to minimize the amount of user interactions and simplify configuration tasks. Automation is a proper solution for minimizing the amount of user interaction. Fully automated security systems a...
Efficient and reliable access control in smart cities is critical for the protection of various resources decision making task execution. Existing centralized schemes suffer from limitations single point failure, low reliability, poor scalability. This article, therefore, proposes a distributed framework by combining blockchain contract technology attribute-based (ABAC) model. The consists one ...
Access control systems using the latest biometric technologies can offer a higher level of security than conventional passwordbased systems. Their widespread deployments, however, can severely undermine individuals’ rights of privacy. Biometric signals are immutable and can be exploited to associate individuals’ identities to sensitive personal records across disparate databases. In this paper,...
Web service is a new service-oriented computing paradigm which poses the unique security challenges due to its inherent heterogeneity, multidomain characteristic and highly dynamic nature. A key challenge in Web services security is the design of effective access control schemes. Attribute-based access control (ABAC) is more appropriate than some other access control mechanisms, but it do not f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید