نتایج جستجو برای: based control

تعداد نتایج: 3958361  

2014
Ai Fei Zhang Ping

For the Computer Supported Collaborative Design (CSCD) environment’s groups, dynamics and distribution characteristics, the paper proposes a Task & Role-Based access control model (T & RBAC) and makes the informal definition of the model. The T & RBAC model is based on the T-RBAC model, and extends the definition of the Users, Roles, Tasks, Permissions and the other factors. In the T&RBAC model...

2006
Xin Jin

................................................................................................................................... ii Acknowledgements ................................................................................................................. iii Table of

Journal: :CoRR 2006
Jonathan K. Adams Basheer N. Bristow

Basic role based access control [RBAC] provides a mechanism for segregating access privileges based upon users' hierarchical roles within an organization. This model doesn't scale well when there is tight integration of multiple hierarchies. In a case where there is joint-tenancy and a requirement for different levels of disclosure based upon a user's hierarchy, or in our case, organization or ...

2009
Jianfeng Lu Ruixuan Li Vijay Varadharajan Zhengding Lu Xiaopu Ma

Ensuring secure interoperation in multidomain environments based on role based access control (RBAC) has drawn considerable research works in the past. However, RBAC primarily consider static authorization decisions based on subjects’ permissions on target objects, and there is no further enforcement during the access. Recently proposed usage control (UCON) can address these requirements of acc...

2003
Mark S. Miller Jonathan S. Shapiro

Access control systems must be evaluated in part on how well they enable one to distribute the access rights needed for cooperation, while simultaneously limiting the propagation of rights which would create vulnerabilities. Analysis to date implicitly assumes access is controlled only by manipulating a system's protection state—the arrangement of the access graph. Because of the limitations of...

2003
Konstantina Stoupa Athena Vakali

Lately, Web-accessed resources have superceded the resources accessed by local or wide-area networks. Therefore, new mechanisms should be implemented for protecting resources from unknown clients. Attribute Certificates is a quite new technology offering such functionality. Those certificates are issued by Attribute Authorities validating the attributes of the owner of the certificate. Based on...

2010
Jean Bacon David M. Eyers Jatinder Singh

This chapter examines techniques for securing various types of event-based systems. The first section discusses typical application requirements. The following section examines specific event dissemination approaches. Applying applicationlevel security to event-based systems is introduced at first, along with an overview of Role-Based Access Control. Application-level security is a perimeter de...

2013
Marzieh Bahrami Mohammad Reza Khayyambashi Seyed Ali Razavi Ebrahimi

There have been many security solutions to secure representation in the work flow used in business processes and Grid Networks. Most of these solutions try to provide maximum security in workflow processes and most of them are used Role-Based Access Control model (RBAC). Capability Role-Base Access Control (CRBAC) is one of the models that are used to model RBAC which in this paper, we introduc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید