Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 1-10 of 48 total results
Muhammad Nabeel Tahir Hierarchies in Contextual Role ...
Abstract. Hierarchical representation is a natural way of organizing roles in role-based access control systems. Besides its advantages of providing a way of establishing parent-child relationships among different roles, it also provides a facility to design and organize context dependant application roles that users may activate depending on their current context (spatial, temporal) conditions....
C-RBAC: CONTEXTUAL ROLE-BASED ACCESS CONTROL MODEL
C-RBAC: CONTEXTUAL ROLE-BASED ACCESS CONTROL MODEL Muhammad Nabeel Tahir Multimedia University, Malaysia m_nabeeltahir@hotmail.com ABSTRACT Widely strewn resources have made organizations engrossed to know not only who, when and from where but also for what purpose an access request has been made to use the organization resources....
Muhammad Nabeel Tahir Hierarchies in Contextual Role ...
Download Citation | Muhammad Nabeel Tahir Hierarchies in Contextual Role- Based Access Control Model (C-RBAC) | Hierarchical representation is a natural way of organizing roles in role-based ...
Security Enhancement Mechanism Based on Contextual ...
To address this issue, we extend our previous work [] and introduce context-aware computing to expand Role-Based Access Control (RBAC) [], while categorizing tags by role, i.e., one tag belongs to one user and different users can be categorized by role.Assume each user is rational and follows the behaviorial pattern of location-aware constraints within a certain time interval....
C-RBAC: contextual role-based access control model
Choi et al. [16] proposed Ontology-Based Access Control Model (Onto-ACM) by using Context-aware Role-Based Access Control (C-RBAC) concepts [17] to provide a semantic analysis model that can ......
An Ontology-Based Approach to Dynamic Contextual Role for ...
IEEE Xplore, delivering full text access to the world's highest quality technical literature in engineering and technology. | IEEE Xplore An Ontology-Based Approach to Dynamic Contextual Role for Pervasive Access Control - IEEE Conference Publication
What is Role-Based Access Control (RBAC)? Examples ...
Examples of Role-Based Access Control Through RBAC, you can control what end-users can do at both broad and granular levels. You can designate whether the user is an administrator, a specialist user, or an end-user, and align roles and access permissions with your employees’ positions in the organization.
Muhammad Nabeel Tahir Hierarchies in Contextual Role ...
We extend our work of Contextual Role-Based Access Control (C-RBAC) by introducing hierarchical relationship among subject, location and purpose roles and solve the disambiguation problem in hierarchy by considering user motion direction and his/her context roles (spatial and spatial purpose) in order to make more fine grained and better access ......
https://core.ac.uk/display/21836176
Average Rating (0 votes)
Role-based access control - Wikipedia
In computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC). Role-based access control (RBAC) is a policy-neutral access-control me...
Chapter 4 Flashcards | Quizlet
Role-based access control: Controls access based on the roles that users have within the system and on rules stating what accesses are allowed to users in given roles. List and define the three classes of subject in an access control system.
1 2 3 4 5
Pages
|