Role-based Security

نویسندگان

  • Matunda Nyanchama
  • Sylvia Osborn
چکیده

User role-based protection presents a exible (hence adaptive) means for enforcing diering ranges of security policies. It can emulate both mandatory and discretionary access control modes of protection. Role-based protection enforces the principle of least privilege, hence minimizing the risk of Trojan horse attacks. This paper oers a glimpse into the strengths (and some weaknesses) of role-based protection, the structures for its enforcement and pointers to the direction for future research.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigating the Effects of Psychological Capital on Evidence-based Clinical Practice of Nurses in Dealing With COVID-19 Patients: The Mediating Role of Psychological Security

Objectives: Given the outbreak of COVID-19 pandemic and its adverse effects on social psychological health, especially nurses, psychological empowerment of nurses can increase their psychological security and improve their clinical performance during critical situations. This study aims to investigate the relationship between nurses’ psychology capital and their clinical performance, with a foc...

متن کامل

Assessing the role of local councils in the development of sustainable urban security (Case Study; Urmia City)

Increasing urbanization today and the lack of integrated urban management have led to inadequate planning in cities. In this regard, the local councils, as the most prominent local institutions and the most important decentralization manifestations, symbolize the serious presence of the people to determine their own fate, if they are institutionalized in the governance structure as coordinators...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Security of Sponge structures

Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...

متن کامل

The Role of geo-political and the Transit geo-economic of energy (oil and gas) Persian Gulf over Iran's National Security

 Abstract: One of the most important geo-political variables influencing the country's fate is the energy variable and one of the ways that Iran can increase its national security factor is to pay attention to foreign policy based on security and transit of energy (oil and gas). In the new geo-economic territories, Iran plays a vital role in the Middle East region in general and in the Persian...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1993