نتایج جستجو برای: rbac

تعداد نتایج: 769  

Journal: :Computer Communications 2021

In a rapidly changing IT environment, access to the resources involved in various projects might change randomly based on role-based control (RBAC) system. Hence, security administrator needs dynamically maintain role assignments users for optimizing user-role assignments. The manual updation of is prone error and increases administrative workload. Therefore, recommendation model introduced RBA...

Journal: :Computer Science & Engineering: An International Journal 2012

2001
Ravi S. Sandhu

In the past five years there has been tremendous activity in role-based access control (RBAC) models. Consensus has been achieved on a standard core RBAC model that is in process of publication by the US National Institute of Standards and Technology (NIST). An early insight was that RBAC cannot be encompassed by a single model since RBAC concepts range from very simple to very sophisticated. H...

2017
Ahmad Kamran Malik Abdul Mateen Muhammad Anwar Abbasi Basit Raza Malik Ahsan Ali Wajeeha Naeem Yousra Asim Majid Iqbal Khan

Collaborative environments need access control to data and resources to increase working cooperation efficiently yet effectively. Several approaches are proposed and multiple access control models are recommended in this domain. In this paper, four Role-Based Access Control (RBAC) based collaborative models are selected for analysis and comparison. The standard RBAC model, Team-based Access Con...

2013
Maria Leitner

Role-based Access Control (RBAC) is de facto standard for access control in Process-aware Information Systems (PAIS); it grants authorization to users based on roles (i.e. sets of permissions). So far, research has centered on the design and run time aspects of RBAC. An evaluation and veri cation of a RBAC system (e.g., to evaluate ex post which users acting in which roles were authorized to ex...

2005
Chen Zhao NuerMaimaiti Heilili Shengping Liu Zuoquan Lin

Role-based access control (RBAC) is recognized as an excellent model for access control in large-scale networked applications. Formalization of RBAC in a logical approach makes it feasible to reason about a specified policy and verify its correctness. We propose a formalization of RBAC by the description logic language ALCQ. We also show that the RBAC constraints can be captured by ALCQ. Furthe...

2010
Dae-Kyoo Kim Lunjin Lu Sangsig Kim

Role-based access control (RBAC) is a popular access control model for enterprise systems due to its economic benefit and scalability. There are many RBAC features available, each providing a different feature. Not all features are needed for an RBAC system. Depending on the requirements, one should be able to configure RBAC by selecting only those features that are needed for the requirements....

2004
Dae-Kyoo Kim Indrakshi Ray Robert B. France Na Li

Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying RBAC policies but there is still a need for RBAC policy specification techniques that can be integrated into software design methods. This paper describes a method for incorporating specifications of RBAC policies into UML desig...

2017
Maanak Gupta Farhan Patwa Ravi S. Sandhu

Hadoop ecosystem provides a highly scalable, fault-tolerant and cost-effective platform for storing and analyzing variety of data formats. Apache Ranger and Apache Sentry are two predominant frameworks used to provide authorization capabilities in Hadoop ecosystem. In this paper we present a formal multi-layer access control model (called HeAC) for Hadoop ecosystem, as an academic-style abstrac...

Journal: :Advances in Computers 1998
Ravi S. Sandhu

The basic concept of role-based access control (RBAC) is that permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. This idea has been around since the advent of multi-user computing. Until recently, however, RBAC has received little attention from the research community. This article describes the motivations, results a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید