نتایج جستجو برای: access control

تعداد نتایج: 1607635  

Journal: :CoRR 2006
Jonathan K. Adams

Significant research has been done in the area of Role Based Access Control [RBAC]. Within this research there has been a thread of work focusing on adding parameters to the role and permissions within RBAC. The primary benefit of parameter support in RBAC comes in the form of a significant increase in specificity in how permissions may be granted. This paper focuses on implementing a parameter...

2007
Jianshi Li

Separation of duty (SOD) is an important characteristic in the role-based access control (RBAC) system. In view of some issues such as various variations of SOD constraints (SODs), ambiguous relations among constraint states, this paper formally defines several typical SODs and analyzes the transition relations among different SODs states. In combination with a delegation case, it goes an explo...

2002
Susana Montero Ignacio Aedo Paloma Díaz

Role-based access control policies model the users domain by means of complex structures where the roles assumed by the users are specialized into more concrete subroles which inherit properties and authorizations from their parents. In this paper, we describe how to combine these principles and adaptation to provide personalized access to the different types of users of a webbased course. We a...

Journal: :JDIM 2011
Weifeng Sun Cheng Guo Peng Zhang Ning Zhang Haotian Wang

In large-scale grid environment, the authorization plays a vital role in access control to resources. For the demand of higher dynamicity, complexity and granularity on grid environment, a novel model named dynamic role-based access control (DRBAC) based on RBAC model is presented. DRBAC introduces conceptions of several objects such as rolegraph initial structure, atom role and middle role, an...

2012
Nimalaprakasan Skandhakumar Farzad Salim Jason Reid Ed Dawson

Physical access control systems play a central role in the protection of critical infrastructures, where both the provision of timely access and preserving the security of sensitive areas are paramount. In this paper we discuss the shortcomings of existing approaches to the administration of physical access control in complex environments. At the heart of the problem is the current dependency o...

2004
Giuseppe Psaila Fulvio Biondi

The increasing complexity of (distributed) information systems requires new solutions for dealing with access control problems. In particular, information systems are based on a large number of resources, with very complex structure, that must be accessed by a large variety of users. Traditional and instance based solutions are not adequate. In this paper, we propose a new approach to the probl...

2000
Damian G. Cholewka Reinhardt A. Botha Jan H. P. Eloff

Role-based access control associates roles with privileges and users with roles. Changes to these associations are infrequent and explicit. This may not reflect business requirements. Access to an object should not only be based on the identity of the object and the user, but also on the actual task that must be performed, i.e. the context of the work to be done. Context-sensitive access contro...

2003
András Belokosztolszki David M. Eyers Wei Wang Ken Moody

Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification languages. However there has been little attention paid to the way in which access control policy is stored persistently. This paper investigates policy storage from the perspective of access control to the policy itself, and o...

2001
Ravi S. Sandhu

In the past five years there has been tremendous activity in role-based access control (RBAC) models. Consensus has been achieved on a standard core RBAC model that is in process of publication by the US National Institute of Standards and Technology (NIST). An early insight was that RBAC cannot be encompassed by a single model since RBAC concepts range from very simple to very sophisticated. H...

Journal: :Kybernetes 2008
Dejun Chen Zude Zhou Yingzhe Ma D. T. Pham

Purpose – The purpose of this paper is to create a model of role-based access control (RBAC) based access control for virtual enterprise (VE). Design/methodology/approach – An access control model for security and management of VE is presented by integrating generic structure of VE and applying the principles of RBAC. In addition, the application of the model to a supply chain-oriented VE illus...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید