نتایج جستجو برای: rbac

تعداد نتایج: 769  

2012
Khalid Zaman Bijon Ram Krishnan Ravi S. Sandhu

Role Based Access Control (RBAC) has received considerable attention as a model of choice for simplified access control over the past decade. More recently, risk awareness in access control has emerged as an important research theme to mitigate risks involved when users exercise their privileges to access resources under different contexts such as accessing a sensitive file from work versus doi...

2007
Xiaofeng Meng Daofeng Luo

As XML has been increasingly important as the Data-change format of Internet and Intranet, Access-Control-On-XML-Properties rises as a new issue. Role-Based Access Control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years. Though RBAC is already relatively mature in the above fields, new problems occur when it is use...

2003
Etienne J. Khayat Ali E. Abdallah

Role-Based Access Control (RBAC) is very useful for providing a high level description of access control. It enables a better understanding of the security problems in an institution because it bridges the gap between their technical aspects and their managerial descriptions. Several models have been devised to describe RBAC. However, the definitions of some of the concepts of RBAC, such as sub...

2006
Saad Zafar Kirsten Winter Robert Colvin R. G. Dromey

Role-based access control (RBAC) has been acknowledged as an effective mechanism for specifying and enforcing access control policies. However, it is not always clear how an RBAC policy can be systematically integrated into the system design so as to preserve the desired security requirements. In this paper we propose a representation and a process that supports systematic integration of an acc...

2006
Haibo Yu Qi Xie Haiyan Che

RB-RBAC (Rule-Based RBAC) provides the mechanism to dynamically assign users to roles based on a finite set of authorization rules defined by the enterprise's security policy. The RB-RBAC family introduces negative authorization, represented by negative roles, which may bring conflict, and conflict detection and resolution become an import work in RB-RBAC policy management. We proposed a formal...

2012
Xin Jin Ram Krishnan Ravi S. Sandhu

Recently, there has been considerable interest in attribute based access control (ABAC) to overcome the limitations of the dominant access control models (i.e, discretionary-DAC, mandatory-MAC and role based-RBAC) while unifying their advantages. Although some proposals for ABAC have been published, and even implemented and standardized, there is no consensus on precisely what is meant by ABAC ...

2012
Nakeisha Schimke John Hale

We previously developed an enhanced Role-Based Access Control (RBAC) model to support information access management in the context of team collaboration and workflow. We report in this paper a generic system framework to implement the enhanced RBAC with three functional layers: (1) encoding of access control policies; (2) interpretation of the encoded policies; and (3) application of policies t...

2014
Ai Fei Zhang Ping

For the Computer Supported Collaborative Design (CSCD) environment’s groups, dynamics and distribution characteristics, the paper proposes a Task & Role-Based access control model (T & RBAC) and makes the informal definition of the model. The T & RBAC model is based on the T-RBAC model, and extends the definition of the Users, Roles, Tasks, Permissions and the other factors. In the T&RBAC model...

2000
Michael Eonsuk Shin Gail-Joon Ahn

In role-based access control (RBAC) permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. The principal motivation behind RBAC is to simplify administration. Several frameworks for the development of role-based systems have been introduced. There are, however, a few works specifying RBAC in a way which system developers ...

Journal: :Mathematical Structures in Computer Science 2013
Mirco Kuhlmann Karsten Sohr Martin Gogolla

Stringent security requirements of organizations like banks or hospitals frequently adopt role-based access control (RBAC) principles to represent and simplify their internal permission management. While representing a fundamental advanced RBAC concept enabling precise restrictions on access rights, authorization constraints increase the complexity of the resulting security policies so that too...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید