نتایج جستجو برای: abac

تعداد نتایج: 142  

Journal: :IEEE Access 2023

Recent research has focused on applying blockchain technology to solve security-related problems in Internet of Things (IoT) networks. However, implementing directly IoT networks is prone high overheads and energy-expensive operations. Therefore, this paper, we use edge computing avoid these problems. We also propose a novel Trust-based Access Control Mechanism for Edge-IoT Networks using Block...

Journal: :Applied sciences 2023

There is an increasing demand for processing large volumes of unstructured data a wide variety applications. However, protection measures these big sets are still in their infancy, which could lead to significant security and privacy issues. Attribute-based access control (ABAC) provides dynamic flexible solution that effective mediating access. We analyzed implemented prototype application ABA...

2015
Michael Kunz Ludwig Fuchs Matthias Hummer Günther Pernul

Efficient and secure management of access to resources is a crucial challenge in today’s corporate IT environments. During the last years, introducing company-wide Identity and Access Management (IAM) infrastructures building on the Role-based Access Control (RBAC) paradigm has become the de facto standard for granting and revoking access to resources. Due to its static nature, the management o...

Journal: :International Journal of Advanced Trends in Computer Science and Engineering 2020

Journal: :International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2019

Journal: :International Journal on Cloud Computing: Services and Architecture 2017

2008
Adam J. Lee ADAM J. LEE

The ubiquity of the Internet has led to increased resource sharing between large numbers of users in widely-disparate administrative domains. Unfortunately, traditional identity-based solutions to the authorization problem do not allow for the dynamic establishment of trust, and thus cannot be used to facilitate interactions between previously-unacquainted parties. Furthermore, the management o...

2009
Arnon Rosenthal Leonard J. Seligman Adriane Chapman Barbara T. Blaustein

Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing on complex conditions and scalable administration. We use Attribute-Based Access Control (ABAC) to express conditions based on many attributes, instead of roles. We then make administration and management more scalabl...

2016
Philippe Gall Patrick Gougeon

The crystal structure of the title compound, dilithium germanium trimolybdenum octa-oxide, consists of distorted hexa-gonal-close-packed oxygen layers with stacking sequence ABAC along [001] that are held together by alternating lithium-germanium and molybdenum layers. The two Li(+) and Ge(4+) ions all have site symmetry 3m. and occupy, respectively, tetra-hedral and octa-hedral sites in the ra...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید