Web
Education
Viewing 1-7 of 7 total results
C-RBAC: contextual role-based access control model
Choi et al. [16] proposed Ontology-Based Access Control Model (Onto-ACM) by using Context-aware Role-Based Access Control (C-RBAC) concepts [17] to provide a semantic analysis model that can ......
A Role and Context Based Access Control Model with UML
As the wide uses of access control model in systems, a more agile access control model is required to solve complicated modeling, user authorizing and verifying problem. In this paper, an access control model based on the concepts of role, attribute and context, named C-RBAC, is proposed. This model is based on and further improved role-based access control (RBAC)....
Constructing RBAC Based Security Model in u-Healthcare ...
It is possible to construct a security policy for each enterprise using an RBAC. The basic concepts of role-based access control consist of user (U), role (R), sessions (S), and permission (P) . In addition, role hierarchy, constraints, and privacy purpose group are included.
Context-Dependent Access Control for Web-Based ...
Furthermore, we show how to model this kind of context-dependent access control for web-based collaboration environments by using role-based concepts. Additionally, we present how complex role hierarchies in the context-dependent case can be generated from basic role hierarchies....
Role-based Access Control - ScienceDirect
Role-based Access Control' RAVl S. SANDHU2 Laboratory for Information Security Technology Information and Software Engineering Department, MS 4A4 George Mason University Fairfax, VA 22030 USA Abstract The basic concept of role-based access control (RBAC) is that permissions are associated with roles, and users are made members of appropriate roles, thereby acquiring the roles' permissions....
Contextual Privacy Management in Extended Role Based ...
So, data owner can define authorisations based on different object accuracies. Furthermore, access control models usually permit the access to the stored data based on the role of the requester. We propose to extend this concept to take into account the purpose of the access. For this, we take advantage of the OrBAC user-declared context....
Designing role‐based access control using formal concept ...
The main purpose of the access control policies is to ensure that only authorized users (subjects) can access the information resources (objects) with their allowed access permissions. Role‐based access control (RBAC) is one of the best access control models that supports function‐based access control....
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.