• No results found

role-based access

Database Intrusion Detection Using Role Based Access Control System

Database Intrusion Detection Using Role Based Access Control System

... the Role based Access Control (RBAC) system which controls the administered databases for finding out sensitive attributes of the system ...dynamically. Role based Access Control ...

8

A flexible payment scheme and its role-based access control

A flexible payment scheme and its role-based access control

... its role- based access control ...each role can be assigned one or more privileges that are permitted to users in that ...constraints, role hierarchies, and scenarios of end-users are ...

12

Multimedia System Security Using Access Control Policy Based on Role Based Access Control

Multimedia System Security Using Access Control Policy Based on Role Based Access Control

... levels access the data assigned different sensitivity levels so that the user only gets the data he or she can ...an access control [4]. An access control space represents the permission assignment ...

6

Modified Role Based Access Control Model For Data Security

Modified Role Based Access Control Model For Data Security

... for access to systems and it can protect the unauthorized access to the database ...resources. Role based access control (RBAC) has emerged as a proven technological approach for ...

5

Policy Specification in Role based Access Control on Clouds

Policy Specification in Role based Access Control on Clouds

... work access control method to enhance the security on ...attractive access model because the number of roles is significantly less hence users can be easily classified according to their ...The ...

5

Modelling a Policy Role Based Access Control Mechanism for Task Delegation in a Nomadic Environment

Modelling a Policy Role Based Access Control Mechanism for Task Delegation in a Nomadic Environment

... of Role Based Access Control (RBAC) Mechanisms to proffer access control solutions to role assignments which ordinarily would have be accomplished ...guiding role assignment and ...

13

Efficient Key Management for Enforcing Secure Role Based Access Control on Encrypted Data in Cloud Storage

Efficient Key Management for Enforcing Secure Role Based Access Control on Encrypted Data in Cloud Storage

... complex access control on encrypted data that we call Ciphertext-Policy Attribute- Based Encryption was ...Attribute- Based Encryption systems used attributes to describe the encrypted data and built ...

6

THE ADMINISTRATOR OBJECT PATTERN FOR ROLE-BASED ACCESS CONTROL

THE ADMINISTRATOR OBJECT PATTERN FOR ROLE-BASED ACCESS CONTROL

... The Object-Oriented paradigm approaches the software development by representing real world entities into classes of software objects. Object oriented design patterns facilitate small scale and large scale design reuse. ...

5

A role-based access control schema for materialized views

A role-based access control schema for materialized views

... rule-based access control for materialized views, however, the administration of such systems is time consuming and cumbersome in a large ...a role-based access control schema for ...

69

Enhanced Role based Access Control: Integrating Auditing and Authentication

Enhanced Role based Access Control: Integrating Auditing and Authentication

... (Role Based Access Control) ...control access of legitimate users. However research shows that access control is not a complete solution for securing a ...So, access control ...

8

A Model-driven Role-based Access Control for SQL Databases

A Model-driven Role-based Access Control for SQL Databases

... Abstract. Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts ...

28

Role-Based Access Control within RDBMS

Role-Based Access Control within RDBMS

... Role Based Access Control (RBAC) system proposes creation of user, roles, groups, ...permissions. Access control is a means by which the ability is explicitly enabled or disabled in some ...

8

Privacy enforcement with an extended role-based access control model

Privacy enforcement with an extended role-based access control model

... extended role-based access control (RBAC) model, called Privacy-Aware Role-Based Access Control (PARBAC) model, for enforcing privacy policies within an ...

23

Scalable Transaction Authorization Using Role Based Access Control for Time Based Content Access with Session Management

Scalable Transaction Authorization Using Role Based Access Control for Time Based Content Access with Session Management

... RBAC based on the support extends towards User Role Assignment and as well Permission Role ...Oriented access. The need of Object Oriented paradigm focuses on the user role and invoking ...

5

Self-Adaptive Role-Based Access Control for Business Processes

Self-Adaptive Role-Based Access Control for Business Processes

... Using these functions, saRBAC postconditions are achieved by Removing (i.e., disabling) elements from sets, and Adding (assigning) or Removing (revoking/deassigning) relations be- tween users, roles, and permissions. ...

12

A Distributed Calculus for Role Based Access Control

A Distributed Calculus for Role Based Access Control

... actions. Intuitively, permission R ↑ determines the possibil- ity to activate rˆole R (via the action role), while permissions R ? and R ! determine the possibility of performing input and output actions over a ...

13

Role based access control for a distributed calculus

Role based access control for a distributed calculus

... Rˆole-based access control (RBAC) is increasingly attracting attention because it reduces the complexity and cost of security administration by interposing the no- tion of rˆole in the assignment of ...

39

A Distributed Calculus for Role Based Access Control (talk)

A Distributed Calculus for Role Based Access Control (talk)

... The Example Again The banking scenario again: now each available operation is modelled as a different channel wdrw = withdraw, opn = open account, cc = credit card request the communicat[r] ...

37

ch5.pdf

ch5.pdf

... – Individual access control: bases access rules on individual accounts – Role-based access control (RBAC).. • Bases access rules on organizational roles (e.g., buyer, member of a.[r] ...

42

Show all 10000 documents...

Related subjects