• No results found

Role-Based Access Control Models

Extracting Role-Based Access Control Models from
Business Process Event Logs

Extracting Role-Based Access Control Models from Business Process Event Logs

... Turvaanalüüsi üheks eesmärgiks on ka kontrollida, kas nende andmete hulgas turvalisusega seotud informatsioon on kooskõlas praeguste turvanõuetega. Lisaks, äriprotsessi logide peal saab rakendada äriprotsessikaeve ...

70

An Extensible Framework for Specifying and Reasoning About Complex Role-Based Access Control Models

An Extensible Framework for Specifying and Reasoning About Complex Role-Based Access Control Models

... of access control principles, we strive for the definition of further authorization modules in order to include, for example, obli- gation, delegation of rights, and further workflow ...administrative ...

30

Semantic role-based access control

Semantic role-based access control

... user access are stored as records in database ...RBAC models can be implemented, and the RBAC can be determined by issuing standard SQL queries on RBAC schema ...provide access control at the ...

313

Fuzzy Role-Based Access Control

Fuzzy Role-Based Access Control

... other access control models [16, 8, ...cess control models [7, 9, 1]. We are not aware of any proposal based on the ideas of RBAC which provides such flexibility in the ...

5

Role Based Access Control and OWL

Role Based Access Control and OWL

... Current access control research follows two parallel themes: many efforts focus on developing novel access control models meeting the policy needs of real world application domains ...

12

A Role Engineering Tool for Role-Based Access Control

A Role Engineering Tool for Role-Based Access Control

... scenario-driven role engineering process (for a more detailed description see [8, ...the role engineering process, work profiles are used to derive roles (see Section ...a control objective is a goal ...

8

Recovering Role-based Access Control Security Models from Dynamic Web Applications

Recovering Role-based Access Control Security Models from Dynamic Web Applications

... a role-based access control (RBAC) security model from automatically recovered structural and behavioral models of dynamic web ...security models for a medium-sized production ...

15

Model-Based Analysis of Role-Based Access Control

Model-Based Analysis of Role-Based Access Control

... be removed from the list of elements on which the stereotypes could be applied - and the tooling code could then be regenerated. The second issue was not a bug, but had to do with the way the code generator works, and ...

265

Role based access control for a distributed calculus

Role based access control for a distributed calculus

... a minimal set of permissions required to execute the action, while A 1 does not, since it activated the rˆole admin also to login and read mails. ⋄ 5 Possible Extensions of the Core RBAC Model There is a wide spectrum of ...

39

A Distributed Calculus for Role Based Access Control

A Distributed Calculus for Role Based Access Control

... This paper aims at developing a foundational theory for system behaviors in a RBAC scenario; to the best of our knowledge this is the first attempt in this direction. Our ref- erence model is the so-called RBAC96 model, ...

13

Impediment sensitive-role based access control

Impediment sensitive-role based access control

... 2 Background This section begins with a review of systems, namely Technical Computer-Based Systems and Socio-Technical Systems. The background continues with a discussion of medical instruments, their failures and ...

113

Integrating Attributes into Role-Based Access Control

Integrating Attributes into Role-Based Access Control

... Abstract. Role-based access control (RBAC) and attribute-based access control (ABAC) are currently the most prominent access control ...an access ...

8

Risk-Aware Role-Based Access Control

Risk-Aware Role-Based Access Control

... the role hierarchy using risk analysis of per- ...our models, the extended OASIS model returns binary decisions: a user’s request to take an action with certain outcome is denied if the trustworthiness of ...

16

Risk-Aware Role-Based Access Control

Risk-Aware Role-Based Access Control

... • Existing models have a limited way of access the risk of allowing. access requests (only in terms of users’ trustworthiness)[r] ...

16

Security Analysis in Role-Based Access Control

Security Analysis in Role-Based Access Control

... One may be tempted to reduce the security analysis problem defined in this paper to a problem in one of the other models, such as HRU, and use existing results. However, this approach has several difficulties. ...

30

Situation, Team and Role based Access Control

Situation, Team and Role based Access Control

... and Access Control Layer, shown in Fig. 8. On the Access Control Layer, the components of the conventional RBAC models are defined in addition to the mechanism for personalized ...

9

The Economic Impact of Role-Based Access Control

The Economic Impact of Role-Based Access Control

... collaboration with industry and academics. 3.1.3 Difficulty of Appropriating Returns to Investment RBAC models are generic technologies that can benefit a wide range of industries. It is a technology that will be ...

144

A Role-Based Access Control Kernel for NetBSD

A Role-Based Access Control Kernel for NetBSD

... port, access to a raw device - where the kernel has traditionally used the issuser() function to check that the user requesting the kernel to perform the operation has an effective uid of ...security models ...

11

Security Analysis in Role-Based Access Control

Security Analysis in Role-Based Access Control

... One may be tempted to reduce the security analysis problem defined in this paper to a problem in one of the other models such as HRU and use existing results. However, this approach has several difficulties. ...

28

Advanced permission-role relationship in role-based access control

Advanced permission-role relationship in role-based access control

... in role- based access control ...a role, and as a result, users with the role may have or derive a high level of author- ...a role, the role may still have the ...

13

Show all 10000 documents...

Related subjects