• No results found

role based access control policies

Efficient Key Management for Enforcing Secure Role Based Access Control on Encrypted Data in Cloud Storage

Efficient Key Management for Enforcing Secure Role Based Access Control on Encrypted Data in Cloud Storage

... to access permissions, and all users are mapped to appropriate roles and receive access permissions only through the roles to which they are assigned, or through hierarchical roles, roles get access ...

6

THE ADMINISTRATOR OBJECT PATTERN FOR ROLE-BASED ACCESS CONTROL

THE ADMINISTRATOR OBJECT PATTERN FOR ROLE-BASED ACCESS CONTROL

... Role-based access control policies govern access to information on the basis of activities of ...to access information objects are specified for roles. User acting in a ...

5

A Secure Anti – Collusion Data Sharing Scheme For Dynamic Groups In The Cloud

A Secure Anti – Collusion Data Sharing Scheme For Dynamic Groups In The Cloud

... attributes based on “lazy re-encryption, proxy re-encryption and encryption” to achieve fine-grained data access control without disclosing data ...is based on the secure communication ...

11

Verification of Resilience Policies that Assist Attribute Based Access Control

Verification of Resilience Policies that Assist Attribute Based Access Control

... to access control in critical infrastructures – the authors in [22] provide information on how role based access control policies may appear in SCADA systems, and argue on ...

10

Policy Specification in Role based Access Control on Clouds

Policy Specification in Role based Access Control on Clouds

... work access control method to enhance the security on ...attractive access model because the number of roles is significantly less hence users can be easily classified according to their ...The ...

5

Role of Time Domain Based Access Control Model

Role of Time Domain Based Access Control Model

... Early access control model has HRU model which is proposed by Harrison, Ruzzo and Ullman [1] and Take- Grant model which is proposed by Jones ...discretionary access control model (DAC) and ...

6

Analysis of Different Access Control Mechanism in Cloud

Analysis of Different Access Control Mechanism in Cloud

... In role based access control access decisions are based on the individual’s roles and responsibilities within the cloud ...user’s access to the system based on the ...

6

Analysis of Access Control Methods in Cloud Computing

Analysis of Access Control Methods in Cloud Computing

... Role Based Access Control (RBAC): In this method, security policies are maintained through granting of access rights to roles rather than to individual ...each role was ...

7

Collaboration Policies: Access Control Management in SQA-Based Dynamic Collaborations

Collaboration Policies: Access Control Management in SQA-Based Dynamic Collaborations

... There are a few people, without whom I could not have completed this body of work. I would like to take this opportunity to express my deep gratitude and thanks to those. Dr. Greg Byrd and Doug Brown contributed ...

223

Role-Based Access Control within RDBMS

Role-Based Access Control within RDBMS

... Organizations collect customer’s personal information and some other details for business purposes. It is natural thing that the organization will use this information for different purposes, this leads to concern that ...

8

Multimedia System Security Using Access Control Policy Based on Role Based Access Control

Multimedia System Security Using Access Control Policy Based on Role Based Access Control

... of access control is a challenge for ...grant access at the chapter level or even at the paragraph ...grant access depending on the content or at the pixel ...grant access at the frame ...

6

A Toolkit for Automated Fine-Grained Access Control Policy Enforcement in Oracle 9i

A Toolkit for Automated Fine-Grained Access Control Policy Enforcement in Oracle 9i

... database access control. For example, the Ponder role policy requires the subject-domain to be formally defined, but FGAC does not have such ...definition. Based on the above analysis, in this ...

80

Credential purpose-based access control for personal data protection in web-based applications

Credential purpose-based access control for personal data protection in web-based applications

... used access control methods are based on identity and role based authentication which makes the system unsuitable for open access (Dagdee and Vijaywargiya, ...data access ...

43

Modified Role Based Access Control Model For Data Security

Modified Role Based Access Control Model For Data Security

... Access control is and instrumental to data security and can be done through authentication, authorization, and physical ...for access to systems and it can protect the unauthorized access to ...

5

Penetration testing of AWS based environments

Penetration testing of AWS based environments

... identified services that are running on the target. On the other hand, vulnerability scan- ning deals with specific weaknesses in the software or services that have been discovered. The exploitation phase highly depends ...

55

Access Control Process for a SaaS Provider

Access Control Process for a SaaS Provider

... and policies in place. Before the new access control process, it was a small organization where persons across the company were involved in working on multiple customer projects which required ...

98

A role-based access control schema for materialized views

A role-based access control schema for materialized views

... Username, department, and the role of the user appear on the top right of the header section as in figure 4.7. There is a logout button available that deactivates user session and redirects user to the login page. ...

69

A Composite Access Control Model Based on Attribute and Role

A Composite Access Control Model Based on Attribute and Role

... The composite design of attribute and role is the key of this article. The subject attribute is the core that determines the role assignment. In the traditional RBAC model, there are many-to-many ...

7

A Distributed Calculus for Role Based Access Control (talk)

A Distributed Calculus for Role Based Access Control (talk)

... The Example Again The banking scenario again: now each available operation is modelled as a different channel wdrw = withdraw, opn = open account, cc = credit card request the communicat[r] ...

37

Database Intrusion Detection Using Role Based Access Control System

Database Intrusion Detection Using Role Based Access Control System

... Intrusion detection mechanism helps to secure the data in an organization. In this paper we have discussed in detail how the database could be secured by using Role Based Access Control ...

8

Show all 10000 documents...

Related subjects