Filters








245,059 Hits in 8.9 sec

Core role-based access control

Yanhong A. Liu, Chen Wang, Michael Gorbovitski, Tom Rothamel, Yongxi Cheng, Yingchao Zhao, Jing Zhang
2006 Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation - PEPM '06  
This paper describes a transformational method applied to the core component of role-based access control (RBAC), to derive efficient implementations from a specification based on the ANSI standard for  ...  We calculate precise complexities for three variants of efficient implementations as well as for a straightforward implementation based on the specification.  ...  Introduction Role-based access control (RBAC) is a framework for controlling user access to resources based on roles.  ... 
doi:10.1145/1111542.1111562 dblp:conf/pepm/LiuWGRCZZ06 fatcat:c57ny24eufgzffbxfykacy25yi

Runtime support for rule-based access-control evaluation through model-transformation

Salvador Martínez, Jokin García, Jordi Cabot
2016 Proceedings of the 2016 ACM SIGPLAN International Conference on Software Language Engineering - SLE 2016  
(MAC) [1] , Discretionary Access-Control (DAC) [1] , Role-based Access-Control (RBAC) [27] and Attribute-Based Access-Control [34] .  ...  While enterprise applications and frameworks with a large base of users usually implement and provide their own access-control facilities, i.e., language and runtime infrastructures, as a core component  ... 
doi:10.1145/2997364.2997375 fatcat:pkvbgt3r6zfs3hz4jwvryy3xci

Access Control Role Evolution Mechanism for Open Computing Environment

Aodi Liu, Xuehui Du, Na Wang
2020 Electronics  
We propose a novel genetic-based role evolution algorithm that can effectively mine and optimize roles while preserving the core permissions of the system.  ...  In this paper, we design an evolution mechanism of access control roles for open computing environments.  ...  As a result, it improves the efficiency of the security administrator to implement access control management.  ... 
doi:10.3390/electronics9030517 fatcat:rih3fd4rm5h7xddza6kqa7zgyu

Understanding the Role of Information Technology for Organizational Control Design: Risk Control as New Control Mechanism [chapter]

Manuel Wiesche, Michael Schermann, Helmut Krcmar
2011 IFIP Advances in Information and Communication Technology  
In this paper, we enhance a popular theoretical framework for organizational control design by enclosing IT-enabled controls.  ...  In sum, this research enhances the body of knowledge on organizational control design with a risk-based perspective.  ...  Controls like access control are enabled by IT, making it possible to process masses of data in real time.  ... 
doi:10.1007/978-3-642-24148-2_9 fatcat:r3quoqwzejbfhkyxaiew75hysy

Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor [article]

Yvo Desmedt, Arash Shaghaghi
2016 arXiv   pre-print
transformation to access control.  ...  Security researchers have stated that the core concept behind current implementations of access control predates the Internet.  ...  CONCLUSION Mainly motivated by the ongoing insider threats, we changed Access Control Matrix, the core concept behind current implementations of access control, to Access Control Tensor (ACT).  ... 
arXiv:1609.04514v1 fatcat:wc32dnwd45aydavplxxx35q7dm

Vac - Verifier of Administrative Role-Based Access Control Policies [chapter]

Anna Lisa Ferrara, P. Madhusudan, Truc L. Nguyen, Gennaro Parlato
2014 Lecture Notes in Computer Science  
In this paper we present Vac, an automatic tool for verifying security properties of administrative Role-based Access Control (RBAC).  ...  RBAC has become an increasingly popular access control model, particularly suitable for large organizations, and it is implemented in several software.  ...  Role-based Access Control (RBAC) has become an increasingly popular access control model [5] , it is standardized by NIST and is implemented in several software, such as Microsoft SQL Servers, Microsoft  ... 
doi:10.1007/978-3-319-08867-9_12 fatcat:qxrz5t2q4jexre5mxrsb3hqwsa

Generation of Transmission Control Rules Compliant with Existing Access Control Policies [chapter]

Yoann Bertrand, Mireille Blay-Fornarino, Karima Boudaoud, Michel Riveill
2015 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
To overcome this issue, one can use mechanisms such as Data Loss/Leak Prevention (DLP) or Transmission Control (TC). These mechanisms are based on policies that are defined by security experts.  ...  Access Control (AC) is a well known mechanism that allows access restriction to resources.  ...  Systems such as Plessey System 250 [5] are based on capabilities. Role Based Access Control (RBAC) The paradigm behind RBAC [6] is based on the notion of role.  ... 
doi:10.1007/978-3-319-28865-9_24 fatcat:hwmqdfe4uzedlajmbu7guvwuzu

AN OVERVIEW OF DIRECT OR DISTRIBUTED NUMERICAL CONTROL IN COMPUTER NUMERICAL CONTROL APPLICATIONS

Yudianto Yudianto
2021 Journal of Mechanical Science and Engineering  
Direct numerical control is also known as distributed numerical control (also abbreviated DNC), is a common manufacturing term for networking CNC machine tools.  ...  DNC networking or DNC communication is always required when Computer-Aided Manufacturing (CAM) programs are to run on some CNC machine control.  ...  This system got progress with the role of the computer and efficient system was created, called Computer Numerical Control System (CNC System) and back is enhanced by the central computer system, called  ... 
doi:10.36706/jmse.v7i2.38 fatcat:swocwnfneverfdxb52y4e56jpe

Access control framework for XML document collections

Goran Sladic, Branko Milosavljevic, Zora Konjovic, Milan Vidakovic
2011 Computer Science and Information Systems  
This paper presents the XXACF (eXtensible Role-Based XML Access Control Framework) framework for controlling access to XML documents in different environments.  ...  The proposed access control model of XXACF is described.  ...  The core and hierarchical role-based access control (RBAC) profile of XACML [34] defines a profile for the use of XACML to meet the requirements of RBAC. Haidar et al.  ... 
doi:10.2298/csis100827002s fatcat:h3sx6tbpfff5jeyqvcuc7ytjai

Fine Grained Access Control Based on Smart Contract for Edge Computing

Yong Zhu, Xiao Wu, Zhihui Hu
2022 Electronics  
SCAC (Smart Contract-based Access Control) is based on ABAC (Attributes Based Access Control) and RBAC (Role Based Access Control).  ...  By designing SSH-based interface for edge computing and blockchain access, SCAC parameters can be found and set to adjust ACLs (Access Control List) and their policies.  ...  The framework based on smart contract provides access control methods for subject and implements access authentication for static and dynamic based on predefined policies by checking subject behavior.  ... 
doi:10.3390/electronics11010167 fatcat:bx4cvnqr4zgbjj7hnttkvmsgha

Orchestration and Control in Software-Defined 5G Networks: Research Challenges

Gianfranco Nencioni, Rosario G. Garroppo, Andres J. Gonzalez, Bjarne E. Helvik, Gregorio Procissi
2018 Wireless Communications and Mobile Computing  
The 5G radio access and core networks will be based on a SDN/NFV infrastructure, which will be able to orchestrate the resources and control the network in order to efficiently and flexibly and with scalability  ...  Network slicing emerges as a cost-efficient solution for the implementation of the diverse 5G requirements and verticals.  ...  Acknowledgments This work has been partially supported by the PRA 2018-2019 Research Project "CONCEPT-COmmunication and Networking for vehicular CybEr-Physical sysTems" funded by the University of Pisa  ... 
doi:10.1155/2018/6923867 fatcat:ef5d34pztvhp3pdwgj2ceveagy

Extending access control models with break-glass

Achim D. Brucker, Helmut Petritsch
2009 Proceedings of the 14th ACM symposium on Access control models and technologies - SACMAT '09  
Access control models are usually static, i. e., permissions are granted based on a policy that only changes seldom.  ...  ' access control enforcement architecture.  ...  This extension allows for directly specifying access control within the GUI of ArgoUML.  ... 
doi:10.1145/1542207.1542239 dblp:conf/sacmat/BruckerP09 fatcat:zjhl4tuxdrebbd6rfujxqp5xx4

A Composite Access Control Model Based on Attribute and Role

Jing-yu WANG, Yu-liang GUAN, Wei-zhen LUO
2017 DEStech Transactions on Computer Science and Engineering  
The technology assigns roles based on attribute strategy first and subsequently assigns permissions based on roles, to make the subject operate object by access control.  ...  Aimed at the problem of user privacy protection in cloud computing environment, this paper proposes a composite access control model based on attribute androle.  ...  Acknowledgement This research was financially supported by the National Natural Science Foundation  ... 
doi:10.12783/dtcse/cst2017/12526 fatcat:p6m4asqicrfojg363ya6iwmlya

Technical Committee on Control Education: A First Course in Systems and Control Engineering [Technical Activities]

John Anthony Rossiter, John Hedengren, Atanas Serbezov
2021 IEEE Control Systems  
It is useful for academic staff members whose prime role is research to have a concise summary of good practice with which they can engage and implement courses.  ...  An essential prerequisite for project-based learning is the access to control laboratories.  ...  Hence, it is useful for academic staff members whose prime role is research to have a concise summary of good practice with which they can engage and implement courses.  ... 
doi:10.1109/mcs.2020.3033106 fatcat:y5surqw5k5brvgigthvtjmmyhi

SecurOntology: A semantic web access control framework

Ángel García-Crespo, Juan Miguel Gómez-Berbís, Ricardo Colomo-Palacios, Giner Alor-Hernández
2011 Computer Standards & Interfaces  
Traditional access control frameworks were syntactic and error prone, lacking the necessary expressivity and efficiency of a solution where soundness and completeness of the underlying logics in access  ...  Policies representing resource access based on knowledge-oriented descriptions have gained momentum with the emergence of Semantic Technologies based approaches.  ...  State of the Art Role-based access control (RBAC) is being increasingly recognized as an efficient access control mechanism that facilitates security administration [1] .  ... 
doi:10.1016/j.csi.2009.10.003 fatcat:nfbip6tglbhqdmrt4liyccoecy
« Previous Showing results 1 — 15 out of 245,059 results