A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2013; you can also visit the original URL.
The file type is application/pdf
.
Filters
Core role-based access control
2006
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation - PEPM '06
This paper describes a transformational method applied to the core component of role-based access control (RBAC), to derive efficient implementations from a specification based on the ANSI standard for ...
We calculate precise complexities for three variants of efficient implementations as well as for a straightforward implementation based on the specification. ...
Introduction Role-based access control (RBAC) is a framework for controlling user access to resources based on roles. ...
doi:10.1145/1111542.1111562
dblp:conf/pepm/LiuWGRCZZ06
fatcat:c57ny24eufgzffbxfykacy25yi
Runtime support for rule-based access-control evaluation through model-transformation
2016
Proceedings of the 2016 ACM SIGPLAN International Conference on Software Language Engineering - SLE 2016
(MAC) [1] , Discretionary Access-Control (DAC) [1] , Role-based Access-Control (RBAC) [27] and Attribute-Based Access-Control [34] . ...
While enterprise applications and frameworks with a large base of users usually implement and provide their own access-control facilities, i.e., language and runtime infrastructures, as a core component ...
doi:10.1145/2997364.2997375
fatcat:pkvbgt3r6zfs3hz4jwvryy3xci
Access Control Role Evolution Mechanism for Open Computing Environment
2020
Electronics
We propose a novel genetic-based role evolution algorithm that can effectively mine and optimize roles while preserving the core permissions of the system. ...
In this paper, we design an evolution mechanism of access control roles for open computing environments. ...
As a result, it improves the efficiency of the security administrator to implement access control management. ...
doi:10.3390/electronics9030517
fatcat:rih3fd4rm5h7xddza6kqa7zgyu
Understanding the Role of Information Technology for Organizational Control Design: Risk Control as New Control Mechanism
[chapter]
2011
IFIP Advances in Information and Communication Technology
In this paper, we enhance a popular theoretical framework for organizational control design by enclosing IT-enabled controls. ...
In sum, this research enhances the body of knowledge on organizational control design with a risk-based perspective. ...
Controls like access control are enabled by IT, making it possible to process masses of data in real time. ...
doi:10.1007/978-3-642-24148-2_9
fatcat:r3quoqwzejbfhkyxaiew75hysy
Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor
[article]
2016
arXiv
pre-print
transformation to access control. ...
Security researchers have stated that the core concept behind current implementations of access control predates the Internet. ...
CONCLUSION Mainly motivated by the ongoing insider threats, we changed Access Control Matrix, the core concept behind current implementations of access control, to Access Control Tensor (ACT). ...
arXiv:1609.04514v1
fatcat:wc32dnwd45aydavplxxx35q7dm
Vac - Verifier of Administrative Role-Based Access Control Policies
[chapter]
2014
Lecture Notes in Computer Science
In this paper we present Vac, an automatic tool for verifying security properties of administrative Role-based Access Control (RBAC). ...
RBAC has become an increasingly popular access control model, particularly suitable for large organizations, and it is implemented in several software. ...
Role-based Access Control (RBAC) has become an increasingly popular access control model [5] , it is standardized by NIST and is implemented in several software, such as Microsoft SQL Servers, Microsoft ...
doi:10.1007/978-3-319-08867-9_12
fatcat:qxrz5t2q4jexre5mxrsb3hqwsa
Generation of Transmission Control Rules Compliant with Existing Access Control Policies
[chapter]
2015
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
To overcome this issue, one can use mechanisms such as Data Loss/Leak Prevention (DLP) or Transmission Control (TC). These mechanisms are based on policies that are defined by security experts. ...
Access Control (AC) is a well known mechanism that allows access restriction to resources. ...
Systems such as Plessey System 250 [5] are based on capabilities. Role Based Access Control (RBAC) The paradigm behind RBAC [6] is based on the notion of role. ...
doi:10.1007/978-3-319-28865-9_24
fatcat:hwmqdfe4uzedlajmbu7guvwuzu
AN OVERVIEW OF DIRECT OR DISTRIBUTED NUMERICAL CONTROL IN COMPUTER NUMERICAL CONTROL APPLICATIONS
2021
Journal of Mechanical Science and Engineering
Direct numerical control is also known as distributed numerical control (also abbreviated DNC), is a common manufacturing term for networking CNC machine tools. ...
DNC networking or DNC communication is always required when Computer-Aided Manufacturing (CAM) programs are to run on some CNC machine control. ...
This system got progress with the role of the computer and efficient system was created, called Computer Numerical Control System (CNC System) and back is enhanced by the central computer system, called ...
doi:10.36706/jmse.v7i2.38
fatcat:swocwnfneverfdxb52y4e56jpe
Access control framework for XML document collections
2011
Computer Science and Information Systems
This paper presents the XXACF (eXtensible Role-Based XML Access Control Framework) framework for controlling access to XML documents in different environments. ...
The proposed access control model of XXACF is described. ...
The core and hierarchical role-based access control (RBAC) profile of XACML [34] defines a profile for the use of XACML to meet the requirements of RBAC. Haidar et al. ...
doi:10.2298/csis100827002s
fatcat:h3sx6tbpfff5jeyqvcuc7ytjai
Fine Grained Access Control Based on Smart Contract for Edge Computing
2022
Electronics
SCAC (Smart Contract-based Access Control) is based on ABAC (Attributes Based Access Control) and RBAC (Role Based Access Control). ...
By designing SSH-based interface for edge computing and blockchain access, SCAC parameters can be found and set to adjust ACLs (Access Control List) and their policies. ...
The framework based on smart contract provides access control methods for subject and implements access authentication for static and dynamic based on predefined policies by checking subject behavior. ...
doi:10.3390/electronics11010167
fatcat:bx4cvnqr4zgbjj7hnttkvmsgha
Orchestration and Control in Software-Defined 5G Networks: Research Challenges
2018
Wireless Communications and Mobile Computing
The 5G radio access and core networks will be based on a SDN/NFV infrastructure, which will be able to orchestrate the resources and control the network in order to efficiently and flexibly and with scalability ...
Network slicing emerges as a cost-efficient solution for the implementation of the diverse 5G requirements and verticals. ...
Acknowledgments This work has been partially supported by the PRA 2018-2019 Research Project "CONCEPT-COmmunication and Networking for vehicular CybEr-Physical sysTems" funded by the University of Pisa ...
doi:10.1155/2018/6923867
fatcat:ef5d34pztvhp3pdwgj2ceveagy
Extending access control models with break-glass
2009
Proceedings of the 14th ACM symposium on Access control models and technologies - SACMAT '09
Access control models are usually static, i. e., permissions are granted based on a policy that only changes seldom. ...
' access control enforcement architecture. ...
This extension allows for directly specifying access control within the GUI of ArgoUML. ...
doi:10.1145/1542207.1542239
dblp:conf/sacmat/BruckerP09
fatcat:zjhl4tuxdrebbd6rfujxqp5xx4
A Composite Access Control Model Based on Attribute and Role
2017
DEStech Transactions on Computer Science and Engineering
The technology assigns roles based on attribute strategy first and subsequently assigns permissions based on roles, to make the subject operate object by access control. ...
Aimed at the problem of user privacy protection in cloud computing environment, this paper proposes a composite access control model based on attribute androle. ...
Acknowledgement This research was financially supported by the National Natural Science Foundation ...
doi:10.12783/dtcse/cst2017/12526
fatcat:p6m4asqicrfojg363ya6iwmlya
Technical Committee on Control Education: A First Course in Systems and Control Engineering [Technical Activities]
2021
IEEE Control Systems
It is useful for academic staff members whose prime role is research to have a concise summary of good practice with which they can engage and implement courses. ...
An essential prerequisite for project-based learning is the access to control laboratories. ...
Hence, it is useful for academic staff members whose prime role is research to have a concise summary of good practice with which they can engage and implement courses. ...
doi:10.1109/mcs.2020.3033106
fatcat:y5surqw5k5brvgigthvtjmmyhi
SecurOntology: A semantic web access control framework
2011
Computer Standards & Interfaces
Traditional access control frameworks were syntactic and error prone, lacking the necessary expressivity and efficiency of a solution where soundness and completeness of the underlying logics in access ...
Policies representing resource access based on knowledge-oriented descriptions have gained momentum with the emergence of Semantic Technologies based approaches. ...
State of the Art Role-based access control (RBAC) is being increasingly recognized as an efficient access control mechanism that facilitates security administration [1] . ...
doi:10.1016/j.csi.2009.10.003
fatcat:nfbip6tglbhqdmrt4liyccoecy
« Previous
Showing results 1 — 15 out of 245,059 results