Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   4  
      Computer ScienceAccess ControlAuthority controlRole Based Access Control
    • by 
    •   13  
      Computer ScienceEnterprise ArchitectureService Oriented ArchitectureAccess Control
    • by 
    •   11  
      Computer ScienceAccess ControlVerification and ValidationProceedings
In the realm of cloud services, Amazon DynamoDB's introduction of resource-based policies signifies a notable advancement in access control and security management for its resources. These policies usher in a new era of granular and... more
    • by 
    •   4  
      Cloud ComputingNoSQLSecurity in Cloud ComputingAmazon Web Services
    • by 
    •   4  
      Computer ScienceInternal ControlProcess managementRole Based Access Control
    • by 
    •   8  
      Computer ScienceVerification and ValidationEnforcementPolicy Management
To ensure the security of current information systems, role-based access control (RBAC) is a widely used concept. For this purpose, based on an initial assignment of permissions to users, permissions are grouped to roles, which are then... more
    • by 
    •   5  
      Computer ScienceAccess ControlEvolutionary AlgorithmControl Management
    • by 
    • Artificial Intelligence
Los Alamos National Laboratory has developed a virtual patient record system called TeleMed which is based on a distributed national radiographic and patient record repository located throughout the country. Without leaving their offices,... more
    • by 
    • Computer Science
    • by 
    •   8  
      Information SystemsComputer ScienceComputer GraphicsRadiology
    • by 
    •   16  
      Computer ScienceDatabase SystemsXMLAccess Control
    • by 
    •   7  
      Computer ScienceAccess ControlComputer SecurityAsymmetric Cryptosystem
In recent decades, the number of researches on access control and user actions in computer systems has increased. Over time, there have been two models of implementing Mandatory Access Control (MAC) policies for government institutions... more
    • by 
    •   6  
      Computer ScienceAccess ControlEngineering ScienceNIST
    • by 
    •   6  
      Computer ScienceThe InternetJava CardComputer Network
    • by 
    •   3  
      Computer ScienceAccess ControlRole Based Access Control
    • by 
    •   6  
      Computer ScienceAccess ControlRBACDissertation
    • by 
    •   3  
      Health CareMedicineMedical prescription
The technology evolution has shown a very impressive performance in the last years by introducing several technologies that are based on the concept of component. As time passes, new versions of Component Based technologies are released... more
    • by 
    •   3  
      EngineeringComputer ScienceTransaction Processing
    • by 
    •   6  
      Computer ScienceAccess ControlComputer SecurityThe Internet
In spite of all security issues in the cloud system, distributed cloud environment requires an access control model which should be context aware to handle all issues intelligently. It must include role activation process based on the... more
    • by 
    •   9  
      Computer ScienceInformation TechnologyAccess ControlComputer Security
    • by 
    •   3  
      Computer ScienceAccess ControlRole Based Access Control
Research can rarely be performed on large-scale, distributed systems at the level of thousands of workstations. In this paper, we describe the motivating constraints, design principles, and architecture for an extensible, distributed... more
    • by 
    •   6  
      Computer ScienceOperating SystemsDistributed ComputingArchitecture
    • by 
    •   8  
      Computer ScienceInformation SecurityAccess ControlComputer Security
    • by 
    •   5  
      Computer ScienceCorporate GovernanceSystem ManagementBusiness and Management
    • by 
    •   16  
      Computer ScienceSoftware EngineeringAccess ControlJava
We propose the use of process-based access-control methods in the construction of privacy systems in the present paper. Segregation of duties and least privilege are two key business principles that protect an organization’s valuable data... more
    • by 
    •   4  
      Access ControlBusiness ProcessRole Based Access ControlMandatory Access Control
    • by 
    •   14  
      Computer ScienceEmbodied CognitionAccess ControlTrust Management
    • by 
    •   2  
      Computer ScienceISIC
    • by 
    •   14  
      Information SystemsComputer ScienceAccess ControlDesign Patterns
    • by 
    •   5  
      Computer ScienceAccess ControlEncryptionKey Management
    • by 
    •   11  
      Computer ScienceAccess ControlDelegationInteroperability
    • by 
    •   7  
      Computer ScienceDistributed ComputingHeuristicsHeuristic
The article is devoted for managing and controlling users' permissions, defining users' rights, also developing new profitable role-based access control (RBAC) model in collaborative systems. The basis for the protection of the... more
    • by 
CiteSeerX - Document Details (Isaac Councill, Lee Giles): Applications over a System of Mobile.
    • by 
    • Computer Science
    • by 
    •   8  
      MathematicsComputer ScienceCryptographyTheoretical Computer Science
This study discusses the main relevant use of Java in keeping the payment gateways' transaction security and integrity stable. Various security measures, authentication and authorization procedures, Java features, frameworks and... more
    • by 
    •   7  
      Information TechnologySecurityAuthenticationJavascript
    • by 
    •   10  
      Computer ScienceAccess ControlComputer SecurityOPERATING SYSTEM
    • by 
    •   11  
      Computer ScienceIT ManagementRiskChange Management
    • by 
    •   20  
      Information SystemsComputer ScienceKnowledge ManagementDesign Science
    • by 
    •   19  
      EngineeringComputer ScienceKnowledge ManagementAccess Control
    • by 
    •   11  
      EngineeringEnvironmental ScienceComputer ScienceMARINE POLLUTION
    • by 
    •   5  
      Computer ScienceEntropyHackerSmtp
    • by 
    •   6  
      Computer ScienceArchitectureAccess ControlDatabase Security
    • by 
    •   17  
      American StudiesComputer ScienceInformation TechnologyLaw
    • by 
    •   17  
      American StudiesComputer ScienceInformation TechnologyLaw
PurposeThe purpose of this paper is to create a model of role‐based access control (RBAC) based access control for virtual enterprise (VE).Design/methodology/approachAn access control model for security and management of VE is presented... more
    • by 
    •   7  
      Computer ScienceAccess ControlSupply ChainVirtual Enterprise
    • by 
    •   5  
      Computer ScienceAccess ControlEncryptionKey Management
    • by 
    •   6  
      Computer ScienceAccess ControlGeospatial AnalysisScalability
    • by 
    •   12  
      Computer SciencePrivacySecurityAccess Control
    • by 
    •   3  
      Computer ScienceAccess ControlBlockchain