Academic literature on the topic 'RBAC'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RBAC.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "RBAC"

1

Mitra, Barsha, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri. "Migrating from RBAC to temporal RBAC." IET Information Security 11, no. 5 (September 1, 2017): 294–300. http://dx.doi.org/10.1049/iet-ifs.2016.0258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Gang, Runnan Zhang, Huimin Song, Can Wang, Jinhui Liu, and Aijun Liu. "Ts-RBAC: A RBAC model with transformation." Computers & Security 60 (July 2016): 52–61. http://dx.doi.org/10.1016/j.cose.2016.03.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Damiani, Maria Luisa, Elisa Bertino, Barbara Catania, and Paolo Perlasca. "GEO-RBAC." ACM Transactions on Information and System Security 10, no. 1 (February 2007): 2. http://dx.doi.org/10.1145/1210263.1210265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rao, K. Rajesh, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, and Muttukrishnan Rajarajan. "Role recommender-RBAC: Optimizing user-role assignments in RBAC." Computer Communications 166 (January 2021): 140–53. http://dx.doi.org/10.1016/j.comcom.2020.12.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bonatti, Piero, Clemente Galdi, and Davide Torres. "Event-driven RBAC." Journal of Computer Security 23, no. 6 (December 2, 2015): 709–57. http://dx.doi.org/10.3233/jcs-150539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Joshi, Jyoti. "Improved & Extended-RBAC (Jv-RBAC) Model with X.509 Authentication." Computer Science & Engineering: An International Journal 2, no. 3 (June 30, 2012): 57–66. http://dx.doi.org/10.5121/cseij.2012.2305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shuriya. B, Shuriya B., and Dr S. Sumathi Dr. S. Sumathi. "Study of an RBAC System." Indian Journal of Applied Research 3, no. 3 (October 1, 2011): 104–6. http://dx.doi.org/10.15373/2249555x/mar2013/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.

Full text
Abstract:
The normal role-based access control (RBAC) model decouples users and permissions through roles,and different software systems have different implementation syteles.The paper proposes an engine model which can configure the RBAC management systems flexibly.It is a configuration tool to generate different RBAC management systems which meet different users’ requirements. The practice proves that the engine model can improve the efficiency and quality of software development. The role-based access control model decouples users and permissions through roles in order to simplify authorized operations and safety management[1]. Many literatures[2-6] discuss the RBAC model from different aspects. Some literatures[2-3] add new elements to the normal RBAC model,and these models are unidimensional according to the manipulated resources.For example, the NIST RBAC reference model [2] extends and standardize the RBAC96 [1] model reasonably.Some literatures[4-5] introduce time property to RBAC model and they are two-dimensional models according to the manipulated resources.Literature[6] furtherly add visual data muster to RBAC model and proposes a three-dimensional access control model. All of these models only discuss access control model theoretically,and different role-based access control modules in software systems have different instantiation sytles.For example, a RBAC module in one software system can not meet the access control requirements in another system because different RBAC modules have different table fields in order to realize certain requirements. This paper proposes a flexible role-based access control engine which can configure the RBAC module for different systmes according to each customer’s requirement.The engine is a configuration tool and it can realize various RBAC modules which have different table fields in database.The paper is organized as follows.Section I introduces the basic concepts of the NIST RBAC model;Seciton II details the description of RBAC engine model and gives the configuration steps using this engine to generate RBAC instances,and at last section III gives an example and concludes the paper.
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, In-Tae, Kyung-Yong Chung, Kee-Wook Rim, and Jung-Hyun Lee. "Dynamic RBAC Model based on OSGi." Journal of the Korea Contents Association 9, no. 1 (January 28, 2009): 53–60. http://dx.doi.org/10.5392/jkca.2009.9.1.053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Editorial Office, OBM Integrative and Complementary Medicine. "An Interview with Dr. Sok Cheon Pak." OBM Integrative and Complementary Medicine 07, no. 03 (September 20, 2022): 1–4. http://dx.doi.org/10.21926/obm.icm.2203043.

Full text
Abstract:
Interview with Dr. Sok Cheon Pak.<strong> </strong>Dr Pak as a physiologist currently leads and guides research into nutraceuticals to provide relevant and impactful clinical applications. The best example is the rice bran arabinoxylan compound (RBAC). RBAC is a functional food produced from hydrolysed rice bran denatured with shiitake mushroom enzymes. RBAC demonstrates strong immunomodulatory properties, particularly for enhancing the natural killer cell activity. Additionally, RBAC is a potent antiproliferative food supplement with strong evidence showing that it can arrest tumour proliferation. Dr Pak has recently published a book on RBAC.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "RBAC"

1

Guo, Yuxia. "User/group administration for RBAC." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0001/MQ42067.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Khambhammettu, Hemanth. "Enforcing complex policies in RBAC." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Buccelli, Emanuele. "Ingegnerizzazione di RBAC-MAS in TuCSoN." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8462/.

Full text
Abstract:
L'obiettivo della tesi è la creazione di un'infrastruttura di tipo RBAC (Role Based Access Control), adibita al controllo degli accessi all'interno del linguaggio di coordinazione TuCSoN. Il punto di partenza si basa sull'analisi del lavoro sviluppato dall'Ing. Galassi: "Modello di sicurezza e controllo di accesso in una infrastruttura di coordinazione: architettura e implementazione". Usando questa come base teorica di partenza, si sono estrapolati i concetti chiave e si è data vita ad un'implementazione funzionante e di semplice utilizzo di RBAC in TuCSoN.
APA, Harvard, Vancouver, ISO, and other styles
4

Darwish, Wesam M. "Analysis of ANSI RBAC support in commercial middleware." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/7147.

Full text
Abstract:
This thesis analyzes the access control architectures of three middleware technologies: Common Object Request Broker Architecture (CORBA), Enterprise Java Beans (EJB), and Component Object Model (COM+). For all technologies under study, we formalize the protection state of their corresponding authorization architectures in a more precise and less ambiguous language than their respective specifications. We also suggest algorithms that define the semantics of authorization decisions in CORBA, EJB, and COM+. Using the formalized protection state configurations, we analyze the level of support for the American National Standard Institute's (ANSI) specification of Role-Based Access Control (RBAC) components and functional specification in the studied middleware technologies. This thesis establishes a framework for assessing implementations of ANSI RBAC in the analyzed middleware technologies. Our findings indicate that all of three middleware technologies under study fall short of supporting even Core ANSI RBAC. Custom extensions are necessary in order for implementations compliant with each middleware to support ANSI RBAC required or optional components. Some of the limitations preventing support of ANSI RBAC are due to the middleware's architectural design decisions; however, fundamental limitations exist due to the impracticality of some aspects of the ANSI RBAC standard itself.
APA, Harvard, Vancouver, ISO, and other styles
5

Ma, Mingchao. "Distributed RBAC for subscription-based remote network services." Thesis, University of Greenwich, 2007. http://gala.gre.ac.uk/6232/.

Full text
Abstract:
The problems of identity management inherent in distributed subscription-based resource sharing are investigated in this thesis. The thesis introduces a concept of authentication delegation and distributed RBAC (DRBAC) to support fine granular access control across multiple autonomous resource sites and subscribing sites. The DRBAC model extends the RBAC model to a distributed environment. A prototype system based on the concepts of authentication delegation and distributed role and the distributed RBAC model has been implemented and tested. Access is allowed based on the distributed roles, subject to certain constraints. Enforcing distributed role based access control policies allows organizations to ease the administrative overhead in a distributed environment. This thesis concentrates on both theoretical and practical aspects. It describes the design, implementation and performance of a prototype system that provides controlled access to subscription-based remote network services through a web browser. The prototype system is developed using Java technology and runs on a Tomcat web server. A third-party authentication protocol is designed and employed to exchange security assertions among involved parties. An XML-based policy language has been employed in the system for authorization decision. Public key cryptography and XML security technology are used to ensure the confidentiality and integrity of the system and interaction among the involved parties. The web servers use plug-ins to provide an authentication-delegation service and a policy-based authorization service. Users can use a single userID and password to access multiple subscribed resource sites.
APA, Harvard, Vancouver, ISO, and other styles
6

Regateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática
Nowadays, database application use tools like Java Database Connectivity, Hibernate or ADO.NET to access data stored in databases. These tools are designed to bring together the relational database and object-oriented programming paradigms, forsaking applied access control policies. Hence, the application developers must master the established policies as a means to develop software that is conformant with the established access control policies. Furthermore, there are situations where these policies can evolve dynamically. In these cases it becomes hard to adjust the access control mechanisms. This challenge has led to the development of an extension to the role based access control (RBAC) model where permissions are defined as a sequence of create, read, update and delete (CRUD) expressions that can be executed and the interfaces to access them. From these permissions it's possible to generate security artefacts on the client side, i.e. in a distributed manner, which allows the clients to access the stored data while satisfying the security policies defined. On top of this model extension, a security layer has also been created in order to make the access control secure and obligatory. For the RBAC model extension this work leverages a previous work that created a dynamic access control architecture for relational applications, here referred to as DACA (Dynamic Access Control Architecture). DACA uses business logic information and the defined access control policies to build dynamically the security artefacts for the applications. In situations where the access control policies can evolve dynamically, the security artefacts are adjusted automatically. This base work, however, defines as permissions CRUD expressions, which can be executed in any order, and needs an adequate security layer to authenticate users and protect the system form intruders. Hence, this work aims to create a new architecture, called “S-DRACA” (Secure, Dynamic and Distributed Role-based Access Control Architecture), which extends the work done with DACA so that it is capable of enforcing sequences of CRUD expressions that the applications can execute if the sequences are associated with their roles and the development of a security layer to make it secure. We discuss as well the performance of this system and its applicability to other environments outside of relational databases.
Atualmente, aplicações que acedem a bases de dados utilizam ferramentas como o Java Database Connectivity, Hibernate ou ADO.NET para aceder aos dados nelas armazenados. Estas ferramentas estão desenhadas para unir os paradigmas das bases de dados relacionais e da programação orientada a objetos, mas não estão preocupados com as políticas de controlo de acesso a aplicar. Portanto, os programadores de aplicações têm de dominar as políticas estabelecidas a fim de desenvolver aplicações em conformidade com as políticas de controlo de acesso estabelecidas.. Além disso, existem situações em que as políticas de controlo de acesso podem evoluir dinamicamente. Nestes casos, torna-se difícil adequar os mecanismos de controlo de acesso. Este desafio motivou o desenvolvimento de uma extensão ao modelo de controlo de acesso baseado em papeis (RBAC) que define como permissões sequências de expressões para criar, ler, atualizar e apagar (CRUD) informação e as interfaces de acesso a cada uma delas. A partir destas permissões podem ser gerados artefactos de segurança do lado dos clientes, i.e. de uma forma distribuída, que lhes permitem aceder à informação armazenada na base de dados segundo as políticas definidas. Por cima desta extenção também foi criada uma camada de segurança para tornar o controlo de acesso seguro e obrigatório. Para a extensão do modelo RBAC este trabalho baseou-se num trabalho anterior que criou uma arquitectura dinâmica de controlo de acesso para aplicações de bases de dados relacionais, aqui referida como DACA (Dynamic Access Control Architecture). DACA utiliza informação da lógica de negócio e as políticas de controlo de acesso que foram definidos para criar dinamicamente os artefactos de segurança para as aplicações. Em situações onde as políticas de controle de acesso evoluem de forma dinâmica, os artefactos de segurança são ajustados automaticamente. Este trabalho base, no entanto, define como permissões as expressões CRUD, podendo estas ser executadas em qualquer ordem, e necessita de uma camada de segurança adequada para autenticar utilizadores e proteger os dados sensíveis de intrusos. Portanto, neste trabalho, pretende-se criar uma nova arquitectura, chamada “S-DRACA” (Secure, Dynamic and Distributed Role-based Access Control Architecture), que estende o trabalho feito no âmbito do DACA para que este seja capaz de garantir que sejam cumpridas sequência de expressões CRUD que as aplicações podem executar e que estão associados aos seus papéis nas políticas RBAC e desenvolver uma camada de segurança adequada para a tornar segura. Discutimos, também, o seu desempenho e aplicabilidade em outros ambientes sem ser em bases de dados relacionais.
APA, Harvard, Vancouver, ISO, and other styles
7

Costa, Vanderlei Ferreira da. "Autorização integrada entre portais e Globus baseada no modelo RBAC." Universidade Católica de Santos, 2008. http://biblioteca.unisantos.br:8181/handle/tede/603.

Full text
Abstract:
Made available in DSpace on 2015-02-04T21:45:26Z (GMT). No. of bitstreams: 1 Vanderlei Costa.pdf: 1535805 bytes, checksum: 1edf57ffedf62a0db7a4c94312b486d6 (MD5) Previous issue date: 2008-10-03
Plataformas de grade computacional têm sido adotadas para promover o compartilhamento, agregação e coordenação de grandes quantidades de recursos geograficamente distribuídos e multi-institucionais. Em tais ambientes, que envolvem grandes quantidades de recursos localizados em diversos domínios administrativos e sujeitos a uma diversidade de políticas de controle de acesso, o controle de acesso é obrigatório. Como principal contribuição, o presente trabalho estende o arcabouço (framework) de portais GridSphere com o objetivo de fornecer ferramentas de controle de acesso que podem ser utilizadas para o desenvolvimento de aplicaçõess para grades computacionais. Os mecanismos e ferramentas propostos também realizam o controle de acesso no nível de invocação de serviço, que pode ser usado por qualquer aplicação compatível com OGSA que realize invocações a serviços de grade. Nossa abordagem permite a integração e consistência entre políticas de autorização aplicadas no lado do portal e no lado do provedor de serviço.
APA, Harvard, Vancouver, ISO, and other styles
8

Damasceno, Carlos Diego Nascimento. "Evaluating finite state machine based testing methods on RBAC systems." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-11112016-101158/.

Full text
Abstract:
Access Control (AC) is a major pillar in software security. In short, AC ensures that only intended users can access resources and only the required access to accomplish some task will be given. In this context, Role Based Access Control (RBAC) has been established as one of the most important paradigms of access control. In an organization, users receive responsibilities and privileges through roles and, in AC systems implementing RBAC, permissions are granted through roles assigned to users. Despite the apparent simplicity, mistakes can occur during the development of RBAC systems and lead to faults or either security breaches. Therefore, a careful verification and validation process becomes necessary. Access control testing aims at showing divergences between the actual and the intended behavior of access control mechanisms. Model Based Testing (MBT) is a variant of testing that relies on explicit models, such as Finite State Machines (FSM), for automatizing test generation. MBT has been successfully used for testing functional requirements; however, there is still lacking investigations on testing non-functional requirements, such as access control, specially in test criteria. In this Master Dissertation, two aspects of MBT of RBAC were investigated: FSM-based testing methods on RBAC; and Test prioritization in the domain of RBAC. At first, one recent (SPY) and two traditional (W and HSI) FSM-based testing methods were compared on RBAC policies specified as FSM models. The characteristics (number of resets, average test case length and test suite length) and the effectiveness of test suites generated from the W, HSI and SPY methods to five different RBAC policies were analyzed at an experiment. Later, three test prioritization methods were compared using the test suites generated in the previous investigation. A prioritization criteria based on RBAC similarity was introduced and compared to random prioritization and simple similarity. The obtained results pointed out that the SPY method outperformed W and HSI methods on RBAC domain. The RBAC similarity also achieved an Average Percentage Faults Detected (APFD) higher than the other approaches.
Controle de Acesso (CA) é um dos principais pilares da segurança da informação. Em resumo, CA permite assegurar que somente usuários habilitados terão acesso aos recursos de um sistema, e somente o acesso necessário para a realização de uma dada tarefa será disponibilizado. Neste contexto, o controle de acesso baseado em papel (do inglês, Role Based Access Control - RBAC) tem se estabelecido como um dos mais importante paradigmas de controle de acesso. Em uma organização, usuários recebem responsabilidades por meio de cargos e papéis que eles exercem e, em sistemas RBAC, permissões são distribuídas por meio de papéis atribuídos aos usuários. Apesar da aparente simplicidade, enganos podem ocorrer no desenvolvimento de sistemas RBAC e gerar falhas ou até mesmo brechas de segurança. Dessa forma, processos de verificação e validação tornam-se necessários. Teste de CA visa identificar divergências entre a especificação e o comportamento apresentado por um mecanismo de CA. Teste Baseado em Modelos (TBM) é uma variante de teste de software que se baseia em modelos explícitos de especificação para automatizar a geração de casos testes. TBM tem sido aplicado com sucesso no teste funcional, entretanto, ainda existem lacunas de pesquisa no TBM de requisitos não funcionais, tais como controle de acesso, especialmente de critérios de teste. Nesta dissertação de mestrado, dois aspectos do TBM de RBAC são investigados: métodos de geração de teste baseados em Máquinas de Estados Finitos (MEF) para RBAC; e priorização de testes para RBAC. Inicialmente, dois métodos tradicionais de geração de teste, W e HSI, foram comparados ao método de teste mais recente, SPY, em um experimento usando políticas RBAC especificadas como MEFs. As características (número de resets, comprimento médio dos casos de teste e comprimento do conjunto de teste) e a efetividade dos conjuntos de teste gerados por cada método para cinco políticas RBAC foram analisadas. Posteriormente, três métodos de priorização de testes foram comparados usando os conjuntos de teste gerados no experimento anterior. Neste caso, um critério baseado em similaridade RBAC foi proposto e comparado com a priorização aleatória e baseada em similaridade simples. Os resultados obtidos mostraram que o método SPY conseguiu superar os métodos W e HSI no teste de sistemas RBAC. A similaridade RBAC também alcançou uma detecção de defeitos superior.
APA, Harvard, Vancouver, ISO, and other styles
9

Goran, Sladić. "Model kontekstno zavisne kontrole pristupa u poslovnim sistemima." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2011. http://dx.doi.org/10.2298/NS2011SLADICGORAN.

Full text
Abstract:
Kontrola pristupa odnosno autorizacija, u širem smislu, razmatra na koji način korisnici mogu pristupiti resursima računarskog sistema i na koji način ih koristiti. Ova disertacija se bavi problemima kontrole pristupa u poslovnim sistemima. Tema disertacije je formalna specifkacija modela kontekstno zavisne kontrole pristupa u poslovnim sistemima koji je baziran na RBAC modelu kontrole pristupa. Uvođenjem kontekstno zavisne kontrole pristupa omogućeno je defnisanje složenijih prava pristupa koje u postojećim modelima kontrole pristupa za poslovne sisteme nije bilo moguće realizovati ili bi njihova realizacija bila komplikovana. Dati model primenljiv je u različitim poslovnim sistemima, a podržava defnisanje prava pristupa kako za jednostavne tako i za slo·zene poslovne tokove. Sistem je verifkovan na dva realna poslovna procesa pomoću razvijenog prototipa. Prikazana prototipska implementacija koja ispunjava ciljeve u pogledu funkcionalnosti postavljene pred sistem predstavlja potvrdu praktične vrednosti predloženog modela.
Access control is concerned with the way in which users can access to resources in the computer system. This dissertation focuses on problems of access control for business processes. The subject of the dissertation is a formal specification of the RBAC-based context sensitive access control model for business processes. By using a context-sensitive access control it is possible to define more complex access control policies whose implementation in existing access control models for business processes is not possible or is very complicated. The given model is applicable in diferent business systems, and supports the definition of access control policies for both simple and complex business processes. The model's prototype is verified by two case studies on real business processes. The presented prototype implementation represents a proof of the proposed model's practical value.
APA, Harvard, Vancouver, ISO, and other styles
10

Khayat, Etienne J. "Role-based access control (RBAC) : formal modelling and risk-based administration." Thesis, London South Bank University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435233.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "RBAC"

1

Fischer-Hellmann, Klaus-Peter. Information Flow Based Security Control Beyond RBAC. Edited by Rainer Bischoff. Wiesbaden: Springer Fachmedien Wiesbaden, 2012. http://dx.doi.org/10.1007/978-3-8348-2618-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Filho, Oscar Gomes. RBAC, Rio Branco Atlético Clube: História e conquistas, 1913-1987. Vitória, ES: [s.n.], 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

assot͡siat͡sii͡a, Rossiĭskai͡a bibliotechnai͡a. RBA. Sankt Peterburg: Rossiĭskai͡a bibliotechnai͡a assot͡siat͡sii͡a, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Meroni, Germana, ed. TRIM/RBCC Proteins. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5398-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meroni, Germana. TRIM/RBCC proteins. New York, N.Y: Springer Science+Business Media, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yid mtshoʼi rba rlabs. [Lha-sa]: Bod-ljoṅs mi dmaṅs dpe skrun Khaṅ, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Rba bźed" phyogs bsgrigs. [Pe-cin]: Mi rigs dpe skrun khaṅ, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Katcharian, Hope. Risk-Based Corrective Action (RBCA) at petroleum contaminated sites: The rationale for RBCA and natural attenuation. Springfield, Va: Available from National Technical Information Service, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Woodcock, Gordon R. HRST, rocket/RBCC options: A comparative study. [Washington, DC: National Aeronautics and Space Administration, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Brtse duṅ gi rba rlabs. [Lanzhou]: Kan-suʼu mi rigs dpe skrun khaṅ, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "RBAC"

1

Wang, Lunwei, Lifeng Wei, Xiangke Liao, and Huaimin Wang. "AT-RBAC: An Authentication Trustworthiness-Based RBAC Model." In Grid and Cooperative Computing - GCC 2004 Workshops, 343–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30207-0_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Molesini, Ambra, Enrico Denti, and Andrea Omicini. "RBAC-MAS and SODA: Experimenting RBAC in AOSE." In Engineering Societies in the Agents World IX, 69–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02562-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oleshchuk, Vladimir. "Trust-Aware RBAC." In Lecture Notes in Computer Science, 97–107. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems, 1–2. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_1509-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Barker, Steve, Paul Douglas, and Terry Fanning. "Implementing RBAC Policies." In Research Directions in Data and Applications Security, 27–36. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35697-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems, 1244–45. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems, 1614–16. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chandran, Suroop Mohan, and J. B. D. Joshi. "LoT-RBAC: A Location and Time-Based RBAC Model." In Lecture Notes in Computer Science, 361–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11581062_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ding, Yi, Jun Jin, Jinglun Zhang, Zhongyi Wu, and Kai Hu. "SC-RBAC: A Smart Contract based RBAC Model for DApps." In Human Centered Computing, 75–85. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37429-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bijon, Khalid Zaman, Ram Krishnan, and Ravi Sandhu. "Risk-Aware RBAC Sessions." In Information Systems Security, 59–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "RBAC"

1

Kirkpatrick, Michael S., Maria Luisa Damiani, and Elisa Bertino. "Prox-RBAC." In the 19th ACM SIGSPATIAL International Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2093973.2094018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bertino, Elisa, Barbara Catania, Maria Luisa Damiani, and Paolo Perlasca. "GEO-RBAC." In the tenth ACM symposium. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1063979.1063985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Youman, Charles E. "RBAC transition." In the first ACM Workshop. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/270152.270160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kiviharju, Mikko. "RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies." In International Conference on Security and Cryptography. SCITEPRESS - Science and and Technology Publications, 2014. http://dx.doi.org/10.5220/0005122105000509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ferrara, Anna Lisa, Georg Fuchsbauer, and Bogdan Warinschi. "Cryptographically Enforced RBAC." In 2013 IEEE 26th Computer Security Foundations Symposium (CSF). IEEE, 2013. http://dx.doi.org/10.1109/csf.2013.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Coyne, Edward J. "Prioritizing RBAC features." In the first ACM Workshop. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/270152.270156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sandhu, Ravi. "Issues in RBAC." In the first ACM Workshop. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/270152.270162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ouyang, Kai, and James B. D. Joshi. "CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time." In 2007 IEEE International Performance, Computing, and Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/pccc.2007.358928.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ferreira, Ana, David Chadwick, Pedro Farinha, Ricardo Correia, Gansen Zao, Rui Chilro, and Luis Antunes. "How to Securely Break into RBAC: The BTG-RBAC Model." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bouchahda, Ahlem, Nhan Le Thanh, Adel Bouhoula, and Faten Labbene. "RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "RBAC"

1

Hull, Julie, and Mark Markham. RBAC Driven Least Privilege Architecture For Control Systems. Office of Scientific and Technical Information (OSTI), January 2014. http://dx.doi.org/10.2172/1124080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Klasky, Hilda B., Sashi Tadinada, Paul T. Williams, and Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), September 2013. http://dx.doi.org/10.2172/1093096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Winters, Paul, Benjamin Wakefield, Irene Toma, Anneke Schmider, Frini Chantzi, and Osman Dar. Facilitating progress towards SDG2: Zero Hunger. Royal Institute of International Affairs, February 2022. http://dx.doi.org/10.55317/9781784135072.

Full text
Abstract:
Sustainable Development Goal 2: Zero Hunger (SDG2) remains out of reach. SDG2 progress has slowed over the last few years, and the impact of the COVID-19 pandemic is expected to exacerbate the problem. Improving the leadership, governance and coordination of the three UN Rome-based agencies (RBAs) – the Food and Agriculture Organization (FAO), the International Fund for Agricultural Development (IFAD) and the World Food Programme (WFP) – is crucial to achieving this objective. Lessons from comparable institutions, such as the International Monetary Fund, the World Bank Group and the World Health Organization may prove vital in realizing SDG2. While there are many actors that will influence progress towards this goal, the RBAs are best placed to lead on this initiative through improved transparency and leadership selection processes; the consolidation of RBA meetings and higher-level dialogue at those events; and enhanced collaboration at the regional, country and global levels.
APA, Harvard, Vancouver, ISO, and other styles
4

Samios N. P. RBRC Scientific Review Committee Meeting, Volume 101. Office of Scientific and Technical Information (OSTI), January 2011. http://dx.doi.org/10.2172/1093764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Samios, N. P. RBRC Scientific Review Committee Meeting, Volume 97. Office of Scientific and Technical Information (OSTI), November 2009. http://dx.doi.org/10.2172/972031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

ORGANIZERS: OZAKI, S., and N. P. SAMIOS. PROCEEDINGS OF RIKEN BNL RESEARCH CENTER WORKSHOP: RBRC QCDOC COMPUTER DEDICATION AND SYMPOSIUM ON RBRC QCDOC (VOLUME 74). Office of Scientific and Technical Information (OSTI), July 2005. http://dx.doi.org/10.2172/15020005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

En'yo, Hideto, and Taku Izubuchi. RIKEN/RBRC Scientific Review Committee Meeting (Vol. 132). Office of Scientific and Technical Information (OSTI), May 2019. http://dx.doi.org/10.2172/1524567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Baltz A. RIKEN/RBRC Workshop: future Directions in High Energy QCD. Office of Scientific and Technical Information (OSTI), October 2011. http://dx.doi.org/10.2172/1044786.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Coury, Tarek, and Yi Wen. Global Indeterminacy in Locally Determinate RBC Models. Federal Reserve Bank of St. Louis, 2007. http://dx.doi.org/10.20955/wp.2007.029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Prescott, Edward. RBC Methodology and the Development of Aggregate Economic Theory. Cambridge, MA: National Bureau of Economic Research, July 2016. http://dx.doi.org/10.3386/w22422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography