Web
Education
Viewing 1-4 of 4 total results
A formal role-based access control model for security ...
The presented security policy model supports the specification of Role-Based Access Control (RBAC) policies with role hierarchy, object type hierarchy and role mapping in a multi-domain setting. We define a formal model for network state related to locations and provide the mapping of actions to the formal model....
An analysis of graphs that represent a role-based ...
Abstract. The present work considers structural modification of the role hierarchy in a formal model of the role-based access control. The marked directed graph (the role graph), graphically representing an ordered set of roles, was analyzed to define the ordering relation in the role set and to distribute permissions according to the generated hierarchy....
Access Control Systems: Security, Identity Management and ...
The latest role-based access control (RBAC) standard is also highlighted. This unique technical reference is designed for security software developers and other security professionals as a resource for setting scopes of implementations with respect to the formal models of access control systems....
Designing role‐based access control using formal concept ...
The main purpose of the access control policies is to ensure that only authorized users (subjects) can access the information resources (objects) with their allowed access permissions. Role‐based access control (RBAC) is one of the best access control models that supports function‐based access control....
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.