• No results found

rbac model

XGSP RBAC: Access Control Mechanism based on RBAC Model in Ubiquitous Collaboration System

XGSP RBAC: Access Control Mechanism based on RBAC Model in Ubiquitous Collaboration System

... RBAC model [Ferraiolo, 92, 95, Bishop, 04, Sandhu, 96] is a scheme that describes access rights using the notion of roles predefined in ...As RBAC scheme is applied to collaboration system which ...

26

The Survey Paper on Cloud Security using RBAC model

The Survey Paper on Cloud Security using RBAC model

... the RBAC show depends at work elements of ...display. RBAC can be seen as a type of Mandatory Access Control (MAC) without multilevel security prerequisites ...The RBAC demonstrate has been connected ...

6

Comparative analysis of Role Base and Attribute Base Access Control Model in Semantic Web

Comparative analysis of Role Base and Attribute Base Access Control Model in Semantic Web

... user. RBAC is a best access control model for the local ...The RBAC model has no delegation models which are required for the distributed and collaborative ...

6

Extended RBAC with role attributes

Extended RBAC with role attributes

... that RBAC has become a domain access control technology. RBAC model is mainly based on the different roles which are assigned authorized ...of RBAC is the ...on RBAC is thoroughly ...

13

Title: Role-Based Cryptography

Title: Role-Based Cryptography

... cryptographic RBAC model, called role-key hierarchy model, to support various security features including signature, identification and encryption on role-key ...

5

Cognitive RBAC in Mobile Heterogeneous Networks

Cognitive RBAC in Mobile Heterogeneous Networks

... Cognitive RBAC model to meet the new management requirements in ...This model can provide cognitive network characteristics such as QoS, better end-to-end performance, security, and access ...

28

RBAC and XML Security in Adhoc Networks

RBAC and XML Security in Adhoc Networks

... the RBAC model is gaining attention as a generalized approach and provides several ...the RBAC framework, users are granted membership into roles based on their responsibilities in the ...

5

Study of Access Control Issue in Web Services

Study of Access Control Issue in Web Services

... In the standard RBAC model, where only user roles are considered, there would be three pre-defined roles created for users, Adult, Juvenile, and Child. Each user of the store would be assigned to one of the ...

6

Context-sensitive Access Control Model for Business Processes

Context-sensitive Access Control Model for Business Processes

... A RBAC-based authorization workflow model which has a level request is proposed in ...this model has the attributes of the time domain and the security ...proposed model could be used in the ...

34

Analysis of Various RBAC and ABAC Based Access Control Models with Their Extension

Analysis of Various RBAC and ABAC Based Access Control Models with Their Extension

... full RBAC model is preserved it is simple to manage and ...The model is context aware because during role to permission assignment they taken the dynamic attribute such as time, location ...this ...

6

The RBAC System Based on Role Risk and User Trust

The RBAC System Based on Role Risk and User Trust

... We propose a method to assess and control role risk while building RBAC model based on role mining. This method can make sure the mined roles more secure and stable. Because of this, the security level of ...

7

Extended RBAC with role attributes

Extended RBAC with role attributes

... that RBAC has become a domain access control technology. RBAC model is mainly based on the different roles which are assigned authorized ...of RBAC is the ...on RBAC is thoroughly ...

12

Privacy Aware using Temporal Role Based Access Control Model

Privacy Aware using Temporal Role Based Access Control Model

... based RBAC Model and implemented a modified conflict detection algorithm using fuzzy spliting context variable, spatial and temporal ...proposed model. The proposed model also provides ...

8

Online Full Text

Online Full Text

... parameterized RBAC model is actually similar to the Object-Sensitive RBAC; it improves upon the traditional RBAC model with enhancements that enable the definition of roles which can be ...

6

An Enhanced Cloud Computing Security Model by using RBAC Access Controls

An Enhanced Cloud Computing Security Model by using RBAC Access Controls

... Roles are categorized according to their job functions. Examples include database operator and system administrator. The definition of roles is central to the RBAC model and is highly related to application ...

8

A Hybrid RBAC and Chaos Access (HRCA) Control Mechanism for
Cloud Computing Environment

A Hybrid RBAC and Chaos Access (HRCA) Control Mechanism for Cloud Computing Environment

... technique by combining RBAC and chaos. The proposed Access structure: Let {D1, D2, ..., Dn} can be assumed as scheme will also be analyzed on cost and computational a group of subjects. The group Mf{D1, D2, ..., ...

14

A FRAMEWORK FOR SYNCHRONOUS AND UBIQUITOUS COLLABORATION

A FRAMEWORK FOR SYNCHRONOUS AND UBIQUITOUS COLLABORATION

... Designed a framework for controlling sessions, accesses, and floors for synchronous and ubiquitous collaboration as well as heterogeneous community collaboration XGSP-RBAC Flexible and f[r] ...

40

User access control and security model

User access control and security model

... RBAC governs the access request based on the function of each user as a part of the organization, whereas DAC governs the access request based on the ownership[r] ...

15

Providing Security in Cloud Computing

Providing Security in Cloud Computing

... anyone else. It is not ready to implement or register any get to control lead or strategy. This raises the issue of approach choice for a self- ensured information bundle: who ought to assess the tenets upon a get to ...

7

Using a Client Task Based Approach to Achieve a
Privacy Compliant Access Control System

Using a Client Task Based Approach to Achieve a Privacy Compliant Access Control System

... We believe that it is more useful to think in terms or whether an access right or a task is “dependent” or “independent”. The real reason why Subject-Object based systems are seen as static is that they do not express ...

9

Show all 10000 documents...

Related subjects