Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-8 of 8 total results
Hierarchies in Contextual Role- Based Access Control Model ...
Hierarchies in Contextual Role- Based Access Control Model (C-RBAC) By Muhammad Nabeel Tahir. Abstract. Hierarchical representation is a natural way of organizing roles in role-based access control systems. Besides its advantages of providing a way of establishing parent-child relationships among different roles, it also provides a facility to ...
core.ac.uk/display/28511183
Average Rating (0 votes)
Role-based access control - Wikipedia
In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC). Role-based access control (RBAC) is a policy-neutral access-control me...
Security Enhancement Mechanism Based on Contextual ...
To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication ......
Role Prediction using Electronic Medical Record System Audits
For instance, Task-based Access Control (TBAC) extends traditional user-object relationships by including task-based contextual information. 13 With respect to healthcare, this concept forms the basis of Situation-based Access Control, where access rights depend on where in a guideline, or workflow, the patient is situated. 14, 15 Also of merit ......
Chapter 4 Flashcards | Quizlet
Role-based access control: Controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles. List and define the three classes of subject in an access control system.
 Context-Aware Role Based Access Control Using User ...
Abstract—Role-based access control is widely used in modern enterprise systems because it is adequate for reflecting the functional hierarchy in various organizations’ for access control model. However, environmental changes, such as the increasing
ijcte.org/papers/744-T049.pdf
Average Rating (0 votes)
(PDF) HCRBAC – An Access Control System for Collaborative ...
This paper presents HCRBAC (Healthcare Context-Aware Role-Based Access Control) a data access system for the Mauritian healthcare service, where data access within a healthcare institution is facilitated and controlled through the use of context-awareness, while remote access to data is provided in a secure way....
Security Concepts Flashcards | Quizlet
(3) Role Based Access Control -unlike other access control models which focus on assets and users, Role Based Access Control (RBAC) focuses on users' job functions, i.e. their responsibilities and duties, and the assets they need to use to perform their jobs. A RBAC system consists of three main components: • Permissions • Roles • Users...