نتایج جستجو برای: based control

تعداد نتایج: 3958361  

2003
András Belokosztolszki David M. Eyers Wei Wang Ken Moody

Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification languages. However there has been little attention paid to the way in which access control policy is stored persistently. This paper investigates policy storage from the perspective of access control to the policy itself, and o...

2001
Ravi S. Sandhu

In the past five years there has been tremendous activity in role-based access control (RBAC) models. Consensus has been achieved on a standard core RBAC model that is in process of publication by the US National Institute of Standards and Technology (NIST). An early insight was that RBAC cannot be encompassed by a single model since RBAC concepts range from very simple to very sophisticated. H...

Journal: :Kybernetes 2008
Dejun Chen Zude Zhou Yingzhe Ma D. T. Pham

Purpose – The purpose of this paper is to create a model of role-based access control (RBAC) based access control for virtual enterprise (VE). Design/methodology/approach – An access control model for security and management of VE is presented by integrating generic structure of VE and applying the principles of RBAC. In addition, the application of the model to a supply chain-oriented VE illus...

2000
Manuel Koch Luigi V. Mancini Francesco Parisi-Presicce

Journal: :J. Network and Computer Applications 2009
Deqing Zou Ligang He Hai Jin Xueguang Chen

(ABAC) mechanisms are gaining in popularity while the role-based access control (RBAC) mechanism is widely accepted as a general mechanism for authorization management. This paper proposes a new access control model, CRBAC, which aims to combine the advantages of RBAC and ABAC, and integrates all kinds of constraints into the RBAC model. Unlike other work in this area, which only incorporates o...

Journal: :J. Network and Computer Applications 2001
Gail-Joon Ahn Kwangjo Kim

In role-based access control (RBAC), permissions are associated with roles and users are made members of appropriate roles, thereby acquiring the roles’ permissions. The principal motivation behind RBAC is to simplify administration. In this paper, we investigate one aspect of RBAC administration concerning assignment of users to roles. We introduce a constrained user-role assignment model, cal...

Journal: :Journal of Computer Security 2014
Emre Uzun Vijayalakshmi Atluri Jaideep Vaidya Shamik Sural Anna Lisa Ferrara Gennaro Parlato P. Madhusudan

Providing restrictive and secure access to resources is a challenging and socially important problem. Among the many formal security models, Role Based Access Control (RBAC) has become the norm in many of today’s organizations for enforcing security. For every model, it is necessary to analyze and prove that the corresponding system is secure. Such analysis helps understand the implications of ...

2010
Tyrone Cadenhead Murat Kantarcioglu Bhavani M. Thuraisingham

Today, many organizations generate large amount of data and have many users that need only partial access to resources at any time to collaborate in making critical decisions. Thus, there is a need for a scalable access control model that simplifies the management of security policies and handles the heterogeneity inherent in the information system. This paper proposes an ontology-based distrib...

2015
Andrea Margheri Rosario Pugliese Francesco Tiezzi

The advent of large-scale, complex computing systems has dramatically increased the difficulties of securing accesses to systems’ resources. To ensure confidentiality and integrity, the exploitation of access control mechanisms has thus become a crucial issue in the design of modern computing systems. Among the different access control approaches proposed in the last decades, the policy-based o...

2013
Ivan Cibrario Bertolotti Luca Durante Tingting Hu Adriano Valenzano

The analysis of security policies designed for ICS and SCADA can benefit significantly from the adoption of automatic/semi-automatic software tools that are able to work at a global (system) level. This implies the availability of a suitable model of the system, which is able to combine the abstractions used in the definition of policies with the access control and right management mechanisms u...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید