Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
In the information security arena, one of the most interesting and promising techniques proposed is Role -Based Access Control (RBAC). In the last few years, much work has been done in the definition and implementation of RBAC. However,... more
    • by 
    •   4  
      Information SecurityAccess ControlDesign and DevelopmentRole Based Access Control
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delegating roles that a user can assume or the set of permissions... more
    • by 
    •   6  
      ManagementTheoryDelegationAccess Control Models
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government or- ganizations has led to considerable research in time- and location-based access control schemes. Location-based ac- cess... more
    • by 
    •   6  
      Access ControlTemporal ConstraintsAccess Control ModelsTime Dependent
    • by 
    •   10  
      Integer ProgrammingSecurity PolicyOpen SystemsAuthorisation
A secure, scalable, fine grained and flexible access control is extremely important for the digital society. The approaches used until now (RBAC, Groups in an LDAP Directory, XACML) alone may not be able to deliver to this challenge.... more
    • by 
    •   4  
      Access ControlRole-Based Access ControlAuthorizationRole Based Access Control
The widespread proliferation of wireless networks (WLAN) has opened up new paradigms of security policy management in enterprise networks. To enforce the organizational security policies in wireless local area networks (WLANs), it is... more
    • by 
    •   15  
      Access ControlPervasive ComputingSecurity ManagementWireless Network
    • by  and +1
    •   8  
      Routing protocolsCyber Physical SystemsQuality of ServiceReal Time Systems
    • by 
    •   7  
      Information SystemsStatic AnalysisAccess ControlInformation Flow
This paper discusses the concept of a virtual digital forensic laboratory, which incorporates networked examination and storage machines, secure communications, multi-factor authentication, role-based access control, and case management... more
    • by 
    •   10  
      Digital ForensicsVirtual LaboratoryCase ManagementAsset Management
    • by 
    •   9  
      Information SystemsAccess ControlComputer SecurityShared Knowledge
Oshwal College proposes to develop a model project for student-teacher evaluation entitled A STUDENT-TEACHER EVALUATION SYSTEM. The project is an evaluation system aimed at eliminating paperwork and automatically generates reports on the... more
    • by 
    •   10  
      Information SystemsAccess ControlWeb DevelopmentCloud Computing
Access control policies are used to restrict access to sensitive records for authorized users only. One approach for specifying policies is using role based access control (RBAC) where authorization is given to roles instead of users.... more
    • by 
    •   18  
      Formal Methods (Formal Verification)Theory of ConstraintsRationality ConstraintsAdvanced Dairy Farming Techniques, Constraints in Dairy Farming
Same as, radio-frequency-based wireless networks (RWNs) which used in terrestrial environments. The medium access control (MAC) protocol is a key element for underwater acoustic networks (UWANs). Due to peculiar features of underwater... more
    • by 
    •   16  
      CommunicationWaterWireless CommunicationsAccess Control
    • by 
    •   12  
      Distributed ComputingXMLDatabase Management SystemsComputer Software
    • by 
    •   8  
      Computer ScienceComputational ModelingAccess ControlAuthentication
Appunti del corso di basi di Dati 2 edizione 2014/2015 dell'Università degli Studi di Genova (corso di laurea in informatica). DISCLAIMER: questi appunti li ho presi seguendo le lezioni del corso. Sicuramente contengono errori ed... more
    • by 
    •   8  
      Access ControlDatabasesSQLIndexing in Database
    • by 
    •   7  
      Distributed ComputingTrust ManagementPublic key cryptographyAuthorisation
    • by  and +1
    •   2  
      AssemblyRole Based Access Control
    • by 
    •   17  
      Information SystemsInformation SocietyAccess ControlElectronic Health Records
    • by 
    •   7  
      OPERATING SYSTEMCase StudyResource LimitationEase of Use
Abstract. The Access Matrix is a useful model for understanding the behaviour and properties of access control systems. While the matrix is rarely implemented, access control in real systems is usually based on ac- cess control... more
    • by 
    •   5  
      Access ControlInformation and Communications TechnologyRole Based Access ControlMatrix Model
    • by 
    •   2  
      Distributed ComputingRole Based Access Control
    • by 
    •   3  
      Access ControlAccess Control ModelsRole Based Access Control
The following document will be overlooking the research carried out to develop a sales management system that will implement high end RSA encryption. The report consists of all the research carried out into the field of cybersecurity and... more
    • by 
    •   21  
      Web DesignDigital SignatureAccess ControlCryptography
    • by 
    •   8  
      Wireless securityRBACWireless NetworkWireless Lan
In cloud computing environment the Role Based Access Control (RBAC) model has certain facilities for security communities. This system model has established itself as powerful, highly robust and generalized model for providing security... more
    • by 
    •   3  
      Access ControlCloud Computing SecurityRole Based Access Control
This paper describes NIST's enhanced RBAC model and our approach to designing and implementing RBAC features for networked Web servers. The RBAC model formalized in this paper is based on the properties that were first described in... more
    • by 
    •   12  
      Information SystemsComputer ScienceSecurityAccess Control
    • by 
    •   6  
      Access ControlInformation FlowSecurity PolicyRole Based Access Control
    • by 
    •   8  
      Access ControlFormal SpecificationFormal methodAuthorisation
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased e-ciency. A number of countries are developing nationwide EHR systems... more
    • by 
    •   14  
      EngineeringComputer ScienceBusiness Process ManagementAccess Control
While security is often supported in standard management frameworks, it has been insufficiently approached in most deployment and research initiatives. In this paper we address the provisioning of a security “continuum” for management... more
    • by 
    •   3  
      Key ManagementUtility ComputingRole Based Access Control
    • by 
    •   10  
      Access ControlSecurity RequirementsIdentity managementVirtual Organization
    • by 
    •   7  
      OPERATING SYSTEMCase StudyResource LimitationEase of Use
Role-based access control (RBAC) has been introduced in the last few years, and offers a powerful means of specifying access control decisions. The model of RBAC usually assumes that, if there is a role hierarchy then access rights are... more
    • by 
    •   5  
      Access ControlDelegationRBACAccess Control Models
Nowadays, database application use tools like Java Database Connectivity, Hibernate or ADO.NET to access data stored in databases. These tools are designed to bring together the relational database and object-oriented programming... more
    • by  and +1
    •   16  
      Software EngineeringRelational DatabaseInformation SecurityDatabase Systems
    • by 
    •   7  
      User InterfaceSemantic WebWeb TechnologyGoogle Map
Role-Based Access Control (RBAC) is the most commonly used model on web applications. The advantages of RBAC are the ease of understanding, applying and managing privileges. The static RBAC model cannot alter access permission in... more
    • by 
    •   9  
      Information SecurityNetwork SecurityEnterprise Content ManagementContent Management Systems (CMS)
    • by 
    •   10  
      Decision MakingAccess ControlRisk ManagementRBAC
    • by 
    •   15  
      XMLAccess ControlDecentralized SystemsControl Systems
    • by 
    •   6  
      UsabilityComputer SecurityGenetic AlgorithmUsability Testing
    • by 
    • Role Based Access Control
    • by 
    •   4  
      Security PolicyAccess Control ModelsUnified ModelRole Based Access Control
    • by 
    •   11  
      Software EngineeringAspect-Oriented ProgrammingNetwork SecuritySoftware Architecture
    • by 
    •   12  
      Design ScienceKnowledge sharingSemantic WebSupply Chain
    • by 
    •   17  
      Machine LearningData MiningGraph TheoryAccess Control
    • by 
    •   7  
      SAT Solver DesignAccess ControlSystem DesignControl system
    • by 
    •   9  
      Information TechnologyPhilosophyInformation ManagementPrivacy
    • by  and +1
    •   6  
      Access ControlOPERATING SYSTEMHealth informationHealth Information System
    • by 
    •   9  
      Public AdministrationDisaster ManagementPublic sectorInformation Flow