نتایج جستجو برای: access control

تعداد نتایج: 1607635  

2011
Nazia Leyla Wendy MacCaull

Access control is one of the key features of any healthcare system. This problem is becoming increasingly complex as health care is distributed over many care settings. Most security models for clinical information systems are merely variations of Role-Based Access Control (RBAC) which bases access decisions on the role of the user rather than with patient consent. As a patient is the owner of ...

2002
Axel Kern

The administration of users and access rights in large enterprises is a complex and challenging task. Roles are a powerful concept for simplifying access control, but their implementation is normally restricted to single systems and applications. In this article we define Enterprise Roles capable of spanning all IT systems in an organisation. We show how the Enterprise Role-Based Access Control...

2012
Maria Leitner Anne Baumgraß Sigrid Schefer-Wenzl Stefanie Rinderle-Ma Mark Strembeck

Role-based access control (RBAC) is commonly used to implement authorization procedures in Process-aware information systems (PAIS). Process mining refers to a bundle of algorithms that typically discover process models from event log data produced during the execution of real-world processes. Beyond pure control ow mining, some techniques focus on the discovery of organizational information fr...

2005
Timothy E. Squair Edgard Jamhour Ricardo C. Nabhen

This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follows the RBAC (Role Based Access Control) model proposed by the NIST. The framework is based on the provisioning strategy defined by IETF, i.e., the RBAC information is represented in terms of a PIB (Policy Information Base) and distributed to...

2004
Yibing Kong Janusz R. Getta Ping Yu Jennifer Seberry

One common characteristic of many Policy Support Systems (PSSs) is their dependency on the concept of hierarchy. Hierarchy does not need to be limited to a hierarchy of roles (subject centric) as in traditional Role-Based Access Control (RBAC). Instead, it can be applied to other aspects of PSS such as object, environment, purpose and so on. In this paper, we propose a new generalized model for...

2015
Jianmin Zhao Jian Kang Tiange Li

For the shortcomings of the traditional workflow in flexibility, this paper analyzes the advantages of Role Based Access Control Technology (RBAC) in realizing procedure permission dynamic management. With RBAC applied in it, this paper also constructs the flexible workflow model of Role Based Access Control and gives out the definition of the engine as well as the components concerned. In addi...

2007
Clara Bertolissi Maribel Fernández Steve Barker

Despite the widespread adoption of Role-based Access Control (RBAC) models, new access control models are required for new applications for which RBAC may not be especially well suited and for which implementations of RBAC do not enable properties of access control policies to be adequately defined and proven. To address these issues, we propose a form of access control model that is based upon...

2006
ANDREAS MATTAS IOANNIS MAVRIDIS CHRISTOS ILIOUDIS IOANNIS PAGKALOS

Today’s web-based collaborative applications need new approaches to overcome the shortcomings of classical access control. The limitations on administrative aspects of the existing security models and the requirements for more efficient management of authorizations in order to provide fine-grained and just-in-time access control for collaborative applications are discussed in this paper. The pr...

2008
Jay Jarman James A. McCart Donald J. Berndt Jay Ligatti

Although Role-Based Access Control (RBAC) is a common security model currently, it has not been systematically applied in databases. In this paper, we propose a framework that enforces RBAC based on dynamic query rewriting. This framework grants privileges to data based on an intersection of roles, database structures, content, and privileges. All of this is implemented at the database level, w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید