Role Based Access Control
351 Followers
Recent papers in Role Based Access Control
In the information security arena, one of the most interesting and promising techniques proposed is Role -Based Access Control (RBAC). In the last few years, much work has been done in the definition and implementation of RBAC. However,... more
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delegating roles that a user can assume or the set of permissions... more
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government or- ganizations has led to considerable research in time- and location-based access control schemes. Location-based ac- cess... more
A secure, scalable, fine grained and flexible access control is extremely important for the digital society. The approaches used until now (RBAC, Groups in an LDAP Directory, XACML) alone may not be able to deliver to this challenge.... more
The widespread proliferation of wireless networks (WLAN) has opened up new paradigms of security policy management in enterprise networks. To enforce the organizational security policies in wireless local area networks (WLANs), it is... more
This paper discusses the concept of a virtual digital forensic laboratory, which incorporates networked examination and storage machines, secure communications, multi-factor authentication, role-based access control, and case management... more
Oshwal College proposes to develop a model project for student-teacher evaluation entitled A STUDENT-TEACHER EVALUATION SYSTEM. The project is an evaluation system aimed at eliminating paperwork and automatically generates reports on the... more
Access control policies are used to restrict access to sensitive records for authorized users only. One approach for specifying policies is using role based access control (RBAC) where authorization is given to roles instead of users.... more
Same as, radio-frequency-based wireless networks (RWNs) which used in terrestrial environments. The medium access control (MAC) protocol is a key element for underwater acoustic networks (UWANs). Due to peculiar features of underwater... more
Appunti del corso di basi di Dati 2 edizione 2014/2015 dell'Università degli Studi di Genova (corso di laurea in informatica). DISCLAIMER: questi appunti li ho presi seguendo le lezioni del corso. Sicuramente contengono errori ed... more
Abstract. The Access Matrix is a useful model for understanding the behaviour and properties of access control systems. While the matrix is rarely implemented, access control in real systems is usually based on ac- cess control... more
The following document will be overlooking the research carried out to develop a sales management system that will implement high end RSA encryption. The report consists of all the research carried out into the field of cybersecurity and... more
In cloud computing environment the Role Based Access Control (RBAC) model has certain facilities for security communities. This system model has established itself as powerful, highly robust and generalized model for providing security... more
This paper describes NIST's enhanced RBAC model and our approach to designing and implementing RBAC features for networked Web servers. The RBAC model formalized in this paper is based on the properties that were first described in... more
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased e-ciency. A number of countries are developing nationwide EHR systems... more
While security is often supported in standard management frameworks, it has been insufficiently approached in most deployment and research initiatives. In this paper we address the provisioning of a security “continuum” for management... more
Role-based access control (RBAC) has been introduced in the last few years, and offers a powerful means of specifying access control decisions. The model of RBAC usually assumes that, if there is a role hierarchy then access rights are... more
Role-Based Access Control (RBAC) is the most commonly used model on web applications. The advantages of RBAC are the ease of understanding, applying and managing privileges. The static RBAC model cannot alter access permission in... more