نتایج جستجو برای: rbac

تعداد نتایج: 769  

2013
Hyeok-June Jeong Young-Guk Ha

This paper describes secure control architecture for UAV control system for multiple operator environments. Multiple access of UAV is necessary because UAV must capture and process various data and UAV's functions become more complex and diverse. From this perspective, UAV control system needs to be secure because new control system will be exposed to multiple operators. To discuss this issue, ...

2003
Gail-Joon Ahn

Constraints are an important aspect of role-based access control (RBAC). Although the importance of constraints in RBAC has been recognized for a long time, they have not received much attention. In this paper we classify RBAC constraints into two major classes called prohibition constraints and obligation constraints. To specify these constraints, we utilize a formal language, named RCL2000. I...

Journal: :Journal of Systems and Software 2015
Ameni Ben Fadhel Domenico Bianculli Lionel C. Briand

Prohibiting unauthorized access to critical resources and data has become a major requirement for enterprises. Access control (AC) mechanisms manage requests from users to access system resources; the access is granted or denied based on authorization policies defined within the enterprise. One of the most used AC paradigms is role-based access control (RBAC). In RBAC, access rights are determi...

Journal: :Computer Science and Information Systems 2013

1994
Ravi S. Sandhu Edward J. Coyne Hal L. Feinstein Charles E. Youman

Recently there has been considerable interest in role-based access control (RBAC) as an alternative, and supplement, to the traditional discretionary and mandatory access controls (DAC and MAC) embodied in the Orange Book. The roots of RBAC can be traced back to the earliest access control systems. Roles have been used in a number of systems for segregating various aspects of security and syste...

Journal: :The Journal of the Korea Contents Association 2009

Journal: :Journal of Systems and Software 2011
Sangsig Kim Dae-Kyoo Kim Lunjin Lu Suntae Kim Sooyong Park

Role-based access control (RBAC) is a popular access control model for enterprise systems due to its flexibility and scalability. There are many RBAC features available, each providing a different function. Not all features are needed for an RBAC system. Depending on the requirements, one should be able to configure features on a need basis, which reduces development complexity and thus fosters...

Journal: :Trans. Data Privacy 2014
Dana Zhang Kotagiri Ramamohanarao Rui Zhang Steven Versteeg

Role engineering is the process of defining a set of roles that offer administrative benefit for Role Based Access Control (RBAC), which ensures data privacy. It is a business critical task that is required by enterprises wishing to migrate to RBAC. However, existing methods of role generation have not analysed what constitutes a beneficial role and as a result, often produce inadequate solutio...

2011
Daniel E. Burgner Luay A. Wahsheh Aftab Ahmad Jonathan M. Graham Cheryl V. Hinds Aurelia T. Williams Sandra J. DeLoatch

Wireless environments have been researched considerably over many years. Initially, such applications involve the use of radios but have later evolved into satellites, cellular phones and global positioning systems. One detail involving wireless environments is the need to have them restricted only to those who have a need to use a wireless environment. Such users would have a role with permiss...

2008
Ambra Molesini Enrico Denti Andrea Omicini

Role-Based Access Control models are currently considered as the most effective approach for engineering access control systems. In this paper we experiment their application in the context of Multi-Agent Systems (MAS), by discussing the design of an access control system with an agent-oriented methodology such as SODA. In particular, we show how a clear separation between mechanisms and polici...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید