Role Based Access Control
353 Followers
Recent papers in Role Based Access Control
In the realm of cloud services, Amazon DynamoDB's introduction of resource-based policies signifies a notable advancement in access control and security management for its resources. These policies usher in a new era of granular and... more
To ensure the security of current information systems, role-based access control (RBAC) is a widely used concept. For this purpose, based on an initial assignment of permissions to users, permissions are grouped to roles, which are then... more
Los Alamos National Laboratory has developed a virtual patient record system called TeleMed which is based on a distributed national radiographic and patient record repository located throughout the country. Without leaving their offices,... more
In recent decades, the number of researches on access control and user actions in computer systems has increased. Over time, there have been two models of implementing Mandatory Access Control (MAC) policies for government institutions... more
The technology evolution has shown a very impressive performance in the last years by introducing several technologies that are based on the concept of component. As time passes, new versions of Component Based technologies are released... more
In spite of all security issues in the cloud system, distributed cloud environment requires an access control model which should be context aware to handle all issues intelligently. It must include role activation process based on the... more
Research can rarely be performed on large-scale, distributed systems at the level of thousands of workstations. In this paper, we describe the motivating constraints, design principles, and architecture for an extensible, distributed... more
We propose the use of process-based access-control methods in the construction of privacy systems in the present paper. Segregation of duties and least privilege are two key business principles that protect an organization’s valuable data... more
The article is devoted for managing and controlling users' permissions, defining users' rights, also developing new profitable role-based access control (RBAC) model in collaborative systems. The basis for the protection of the... more
CiteSeerX - Document Details (Isaac Councill, Lee Giles): Applications over a System of Mobile.
This study discusses the main relevant use of Java in keeping the payment gateways' transaction security and integrity stable. Various security measures, authentication and authorization procedures, Java features, frameworks and... more
PurposeThe purpose of this paper is to create a model of role‐based access control (RBAC) based access control for virtual enterprise (VE).Design/methodology/approachAn access control model for security and management of VE is presented... more