نتایج جستجو برای: state role

تعداد نتایج: 2034657  

Journal: :Respiratory Physiology & Neurobiology 2010

2001
James B. D. Joshi Elisa Bertino Arif Ghafoor

A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC’s language constructs allow one to specify various temporal constraints on role, userrole assignments and role-permission assignments. However, the presence of temporal constraints on role enablings and role activation...

2006
Romuald Thion Stéphane Coulondre

This paper focused on two aspects of access control: graphical representation and reasoning. Access control policies describe which operations on resources are granted to users. Role-based access control is the model which introduces the concept of role to design user’ permissions. Actually, there is a lack of tools allowing security officers to describe and reason on their policies graphically...

1997
Steven A. Demurjian T. C. Ting John A. Reisner

Security concerned users and organizations must be provided with the means to protect and control access to object-oriented software, especially with an exploding interest in designing/developing object-oriented software in Java, C++, and Ada95. Our user-role based security (URBS) approach has emphasized: a customizable public interface that appears di erently at di erent times for speci c user...

2006
Luning Xia Jiwu Jing

Access Control is an important mechanism of information security. Role-Based Access Control is a famous access control approach with good flexibility. RBAC96 and ARBAC97 are classical RBAC models. The ARBAC97 model facilitates decentralized administration of RBAC. However, ARBAC97 has some shortcomings in the case of being used in an organization with autonomous subsidiaries. The member of an a...

2004
HyungHyo Lee YoungLok Lee BongNam Noh

RBAC model is renowned as a security model for corporate environment, since its components, especially role hierarchy, are suitable for modeling an organization structure. But the functional role hierarchy constructed through the existing role engineering approaches does not reflect an organization structure, because they do not take the structural characteristics of the organization into accou...

1999
Ioannis Mavridis George Pangalos Marie Khair

In this paper, we present an enhanced use of RBAC features in articulating a security policy for access control in medical database systems. The main advantage of this implementation is that it supports both MAC and DAC features at the same time; a feature that has been proved to be necessary in healthcare environments. The eMEDAC security policy that results from the above implementation provi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید