نتایج جستجو برای: based control

تعداد نتایج: 3958361  

2015
Nuriye Yasemin Alparslan Murat Komesli Murat Osman Ünalir Özgü Can

Özet. Anlamsal web, web içeriklerinin diğer yazılımlar tarafından anlaşılabilir, yorumlanabilir, kullanılabilir olmasını ve bilginin paylaşılmasını amaçlamaktadır. Anlamsal web’de bilginin güvenliği erişim denetimi ile sağlanmaktadır. OBAC(Ontology Based Access Control – Ontoloji Tabanlı Erişim Denetimi) verinin anlamsal tanımının olduğu ontolojilere erişim denetiminin sağlanmasında kullanılan ...

2000
Victor R.L. SHEN

In 1996, Chiu and Hsu proposed a multi-rolebased access control (MRBAC) policy. Nevertheless, the ChiuHsu scheme can be further enforced by role list, union, and intersection (i.e. containment) to deal with the problems regarding the MRBAC and the object role with different security ranks. The author presents an improvement of the Chiu-Hsu scheme using more detailed list structure. This improve...

Journal: :Logical Methods in Computer Science 2006
Radha Jagadeesan Alan Jeffrey Corin Pitcher James Riely

b Bell Labs e-mail address: aje rey bell-labs. om Abstra t. We study me hanisms that permit program omponents to express role onstraints on lients, fo using on programmati se urity me hanisms, whi h permit a ess ontrols to be expressed, in situ, as part of the ode realizing basi fun tionality. In this setting, two questions immediately arise. (1) The user of a omponent fa es the issue of safety...

1998
Ravi S. Sandhu Qamar Munawer

Role-based access control (RBAC) has recently received a lot of attention due to its exibility, expressive power and simplicity in administration. In RBAC permissions are associated with roles and users are made members of roles thereby acquiring the associated permissions. Centralized management of RBAC in large systems is a tedious and costly task. An appealing possibility is to use RBAC itse...

Journal: :Softw., Pract. Exper. 2005
Sacha Brostoff M. Angela Sasse David W. Chadwick Jim Cunningham Uche M. Mbanaso Sassa Otenko

An access control policy writing tool for the PERMIS role-based privileges management infrastructure was iteratively developed employing usability principles and techniques. Expert and intermediate users’ efficiency in policy creation was improved. Three novice users took part in a usability trial with the first prototype, attempting to recreate a simple policy in 15 minutes that had been speci...

Journal: :Computer and Information Science 2009
Chungen Xu Sheng Gong

Role-based access control(RBAC) is a promising technology for managing and enforcing security in large-scale enterprise-wide system, and we were motivated by the need to manage and enforce the strong access control technology of RBAC in large-scale Web environments. Majority of traditional access control models were passive data-protections, which were not suitable for large and complex multi-u...

Journal: :J. Inf. Sci. Eng. 2002
Chang Nian Zhang Cungang Yang

In distributed computing environments, users like to share resources and communicate with each other in order to perform their jobs more efficiently. It is important to keep resources and information from unexpected use by unauthorized users. Therefore, in the past few years there has been a strong demand for access control of distributed shared resources. Role-Based Access Control (RBAC) has b...

Journal: :IJHPCN 2007
Tomoya Enokido

A Role-Based Access Control (RBAC) model is used to make a system secure. In addition to keeping systems secure, objects have to be consistent in the presence of multiple transactions. Traditional locking protocols and timestamp ordering schedulers are based on ‘first-comer-winner’ and ‘timestamp order’ principles to make multiple conflicting transactions serialisable, respectively. In this pap...

2003
Mark Evered

The per-method access control lists of standard internet technologies allow only simple forms of access control to be expressed and enforced. They also fail to enforce a strict need-to-know view of persistent data. Real applications require more flexible security constraints including parameter restrictions, logging of accesses and state-dependent access constraints. In particular, the concept ...

2016
Chaimaa Belbergui Najib Elkamoun Rachid Hilal

Social networks bring together users in a virtual platform and offer them the ability to share -within the Communitypersonal and professional information’s, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information), privacy settings are limited and do not respond to all user...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید