نتایج جستجو برای: abac
تعداد نتایج: 142 فیلتر نتایج به سال:
This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) m...
C. Fred Bergsten is the director of the Peter G. Peterson Institute for International Economics. He was assistant secretary for international affairs of the US Treasury (1977–81) and assistant for international economic affairs at the National Security Council (1969–71). He was chairman of APEC’s Eminent Persons Group, which developed the initial blueprint for the organization’s trade policy st...
Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in a cloud environment. Accessing subjects may dynamically change, resources requiring protection may be created or modified, and subject access requirements to resources may change during the course of the application execution. Users may need to acquire different permissions from different administrative...
Abstract It this paper it is proposed a new access control model – Hybrid Role and Attribute Based Access Control (HRABAC). an extension of Role-Based (RBAC). HRABAC designed for information systems enterprise software combines the advantages RBAC Attribute-Based (ABAC). easy configurable, fine-grained supports role hierarchies. The describes scheme in Laravel package laravelroles/rolespermissi...
To address the mechanism underlying the development of episodic memory, the current study used a modified list learning paradigm for children (i.e. ABCD, ABAC, ABABr) and compared the performance of 4 year-olds, 7 year-olds, and adults. The results show that only the ABABr condition, which involves a 3-way binding structure, differed across age. Additionally, a proposed computational model (mul...
In Grid service environments, traditional identity based access control models are not effective, and access decisions need to be made based on service requesters’ attributes. All of previous attribute based access control (ABAC) models are lacking in protection of users’ privacy because in these models, access control decisions are made by providing the service provider with user attributes. T...
bstract—Bilobalide was found to be a moderately potent ntagonist with a weak use-dependent effect at recombinant uman 1 GABAC receptors expressed in Xenopus oocytes sing two-electrode voltage clamp methodology. Antagoism of bilobalide at homomeric 1 GABAC receptors apeared to be mixed. At low concentration, bilobalide (3 M) aused a parallel right shift and surmountable GABA maxial response of t...
A computational grid environment, due to its heterogeneous, autonomous and dynamic nature is prone to different kinds of faults which may lead to delay in completion of job or even execution of job from starting point. Checkpointing mechanism plays a vital role for making grid more reliable, cost effective and efficient. In this paper, we have proposed schemes based on system checkpointing and ...
Children with autism or Pervasive Developmental Disorder (PDD) often have difficulty regulating sensory input from the environment. These sensory related problems include increased sensitivity to certain sounds, smells, tastes and touch. Many in the field of 11 occupational therapy believe that these sensory issues are related to inappropriate behaviors, and they use the term sensory dysfunctio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید