نتایج جستجو برای: access control

تعداد نتایج: 1607635  

2007
Faranak Farzad Eric S. K. Yu Patrick C. K. Hung

Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are granted to an individual based on her defined roles. Much work has been done on the specification of RBAC models for enforcing access control; however, in order to arrive at appropriate choices of access control for par...

2005
Martín Abadi Andrew Birrell Ted Wobber

We describe a new design for authentication and access control. In this design, principals embody a flexible notion of authentication. They are compound principals that reflect the identities of the programs that have executed, even those of login programs. These identities are based on a naming tree. Our access control lists are patterns that recognize principals. We show how this design suppo...

Journal: :Computing Systems 1992
Luis-Felipe Cabrera Allen Luniewski James W. Stamos

tüe believe that access controls for object-oriented systems should be fine-grained and thus apply to individual methods of individual objects. The efficient support of fine-grained access control is challenging because a check is done on every method invo-cation. rüe present a design that uses access control lists (ACLs) and exploits virtual memory facilities to make these checks run fast. The...

2015
Qasim Mahmood Rajpoot Christian Damsgaard Jensen Ram Krishnan

Role-based access control (RBAC) and attribute-based access control (ABAC) are currently the most prominent access control models. However, they both suffer from limitations and have features complimentary to each other. Due to this fact, integration of RBAC and ABAC has become a hot area of research recently. We propose an access control model that combines the two models in a novel way in ord...

Journal: :CoRR 2010
Ali Hosseini Mohammad Abdollahi Azgomi

Among access control models, Role-Based Access Control (RBAC) is very useful and is used in many computer systems. Static Combination of Duty (SCD) and Dynamic Combination of Duty (DCD) constraints have been introduced recently for this model to handle dependent roles. These roles must be used together and can be considered as a contrary point of conflicting roles. In this paper, we propose sev...

1999
Gregory Tassey Michael P. Gallaher D. Alan C. O ’ Connor B. A. Brian Kropp D.

2005
Yanhong A. Liu Scott D. Stoller

This paper describes a simplified and corrected specification of role-based access control (RBAC) based on the specification in the ANSI standard for RBAC. The simplifications and corrections were made while following a systematic method for deriving efficient implementations from straightforward implementations of clear specifications. The method allows specifications to be written clearly wit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید