نتایج جستجو برای: role based access control

تعداد نتایج: 5076952  

2000
Manuel Koch Luigi V. Mancini Francesco Parisi-Presicce

Journal: :J. Network and Computer Applications 2009
Deqing Zou Ligang He Hai Jin Xueguang Chen

(ABAC) mechanisms are gaining in popularity while the role-based access control (RBAC) mechanism is widely accepted as a general mechanism for authorization management. This paper proposes a new access control model, CRBAC, which aims to combine the advantages of RBAC and ABAC, and integrates all kinds of constraints into the RBAC model. Unlike other work in this area, which only incorporates o...

Journal: :J. Network and Computer Applications 2001
Gail-Joon Ahn Kwangjo Kim

In role-based access control (RBAC), permissions are associated with roles and users are made members of appropriate roles, thereby acquiring the roles’ permissions. The principal motivation behind RBAC is to simplify administration. In this paper, we investigate one aspect of RBAC administration concerning assignment of users to roles. We introduce a constrained user-role assignment model, cal...

Journal: :Journal of Computer Security 2014
Emre Uzun Vijayalakshmi Atluri Jaideep Vaidya Shamik Sural Anna Lisa Ferrara Gennaro Parlato P. Madhusudan

Providing restrictive and secure access to resources is a challenging and socially important problem. Among the many formal security models, Role Based Access Control (RBAC) has become the norm in many of today’s organizations for enforcing security. For every model, it is necessary to analyze and prove that the corresponding system is secure. Such analysis helps understand the implications of ...

2010
Tyrone Cadenhead Murat Kantarcioglu Bhavani M. Thuraisingham

Today, many organizations generate large amount of data and have many users that need only partial access to resources at any time to collaborate in making critical decisions. Thus, there is a need for a scalable access control model that simplifies the management of security policies and handles the heterogeneity inherent in the information system. This paper proposes an ontology-based distrib...

2013
Ivan Cibrario Bertolotti Luca Durante Tingting Hu Adriano Valenzano

The analysis of security policies designed for ICS and SCADA can benefit significantly from the adoption of automatic/semi-automatic software tools that are able to work at a global (system) level. This implies the availability of a suitable model of the system, which is able to combine the abstractions used in the definition of policies with the access control and right management mechanisms u...

2014
Ai Fei Zhang Ping

For the Computer Supported Collaborative Design (CSCD) environment’s groups, dynamics and distribution characteristics, the paper proposes a Task & Role-Based access control model (T & RBAC) and makes the informal definition of the model. The T & RBAC model is based on the T-RBAC model, and extends the definition of the Users, Roles, Tasks, Permissions and the other factors. In the T&RBAC model...

2009
Jianfeng Lu Ruixuan Li Vijay Varadharajan Zhengding Lu Xiaopu Ma

Ensuring secure interoperation in multidomain environments based on role based access control (RBAC) has drawn considerable research works in the past. However, RBAC primarily consider static authorization decisions based on subjects’ permissions on target objects, and there is no further enforcement during the access. Recently proposed usage control (UCON) can address these requirements of acc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید