Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 31-40 of 48 total results
Context-based access control - Wikipedia
Context-based access control (CBAC) is a feature of firewall software, which intelligently filters TCP and UDP packets based on application layer protocol session information. It can be used for intranets, extranets and internets.. CBAC can be configured to permit specified TCP and UDP traffic through a firewall only when the connection is initiated from within the network needing protection....
(PDF) HCRBAC – An Access Control System for Collaborative ...
This paper presents HCRBAC (Healthcare Context-Aware Role-Based Access Control) a data access system for the Mauritian healthcare service, where data access within a healthcare institution is facilitated and controlled through the use of context-awareness, while remote access to data is provided in a secure way....
Role Based Access Control | CSRC
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) (also called 'role based security'), as formalized in 1992 by David Ferraiolo and Rick Kuhn, has become the predominant model for advanced access control because it reduces this cost....
 A Trust-based Context-Aware Access Control Model for Web ...
XML-based Role Based Access Control (X-RBAC) framework that incorporates context-based access control. We outline the configuration mechanism needed to apply our model to the Web services environment, and also describe the implementation architecture for the system. Keywords: XML, Role-Based Access Control, Trust Management, Web-Services 1....
Role-based Access Control -- Identity Manager
In addition, users who have been assigned a role may request any of its optional components, which will be granted without need for additional approvals. Role assignment: Users can be assigned zero or more roles: Some users can be outside the scope of the role-based access control (RBAC) infrastructure.
A contextual role-based access control authorization model ...
In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles....
What is role-based access control (RBAC)? - Definition ...
Role-based access control (RBAC) restricts access to networked resources based on the user's role within the enterprise. Find out how the role-based access control model differs from other access ......
 The Generalized Temporal Role Based Access Control Model
Role Hierarchy in GTRBAC Useful for efficient security management of an organization No previous work has addressed the effect of temporal constraints on role hierarchies GTRBAC-based temporal role hierarchies allow Separation of permission inheritance and role activation semantics that facilitate management of access control...
 LNCS 4602 - A Spatio-temporal Role-Based Access Control Model
critical applications, a formal model for spatio-temporal-based access control is needed that increases the security of the application and ensures that the loca-tion information cannot be exploited to cause harm. In this paper, we propose a spatio-temporal access control model, based on the Role-Based Access Control...
Security Concepts Flashcards | Quizlet
(3) Role Based Access Control -unlike other access control models which focus on assets and users, Role Based Access Control (RBAC) focuses on users' job functions, i.e. their responsibilities and duties, and the assets they need to use to perform their jobs. A RBAC system consists of three main components: • Permissions • Roles • Users...
1 2 3 4 5
Pages
|