Web
Education
Viewing 1-6 of 6 total results
C-RBAC: contextual role-based access control model
Choi et al. [16] proposed Ontology-Based Access Control Model (Onto-ACM) by using Context-aware Role-Based Access Control (C-RBAC) concepts [17] to provide a semantic analysis model that can ...
Security Enhancement Mechanism Based on Contextual ...
(2008). Hierarchies in contextual role-based access control model (C-RBAC). (2003). Is Context-Aware Computing Taking Control away from the User? Three Levels of Interactivity Examined. (2007). Keep on Blockin’ in the free world: Personal access control for low-cost RFID tags. (2008)....
Security Enhancement Mechanism Based on Contextual ...
To address this issue, we extend our previous work and introduce context-aware computing to expand Role-Based Access Control (RBAC) , while categorizing tags by role, i.e., one tag belongs to one user and different users can be categorized by role. Assume each user is rational and follows the behaviorial pattern of location-aware constraints ...
Ontology-based access control model for security policy ...
RBAC (Role-based access control) and C-RBAC (Context-aware RBAC) models do not suggest effective and practical solutions for managers and users based on dynamic access control methods, suggesting a need for a new model of dynamic access control that can address the limitations of cloud computing characteristics....
Security Enhancement Mechanism Based on Contextual ...
To address this issue, we extend our previous work [] and introduce context-aware computing to expand Role-Based Access Control (RBAC) [], while categorizing tags by role, i.e., one tag belongs to one user and different users can be categorized by role.Assume each user is rational and follows the behaviorial pattern of location-aware constraints within a certain time interval....
A Survey of Role Mining | ACM Computing Surveys
A. C. O’Connor and R. J. Loomis. 2010. 2010 Economic analysis of role-based access control. RTI International Report for NIST (2010). Google Scholar; S. Park, Y. Han, and T. Chung. 2006. Context role-based access control for context-aware application. In Proc. of 2nd International Conf. on High Performance Computing and Communications. 572--580....
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.