Journal articles on the topic 'RBAC'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'RBAC.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mitra, Barsha, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri. "Migrating from RBAC to temporal RBAC." IET Information Security 11, no. 5 (September 1, 2017): 294–300. http://dx.doi.org/10.1049/iet-ifs.2016.0258.
Full textLiu, Gang, Runnan Zhang, Huimin Song, Can Wang, Jinhui Liu, and Aijun Liu. "Ts-RBAC: A RBAC model with transformation." Computers & Security 60 (July 2016): 52–61. http://dx.doi.org/10.1016/j.cose.2016.03.006.
Full textDamiani, Maria Luisa, Elisa Bertino, Barbara Catania, and Paolo Perlasca. "GEO-RBAC." ACM Transactions on Information and System Security 10, no. 1 (February 2007): 2. http://dx.doi.org/10.1145/1210263.1210265.
Full textRao, K. Rajesh, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, and Muttukrishnan Rajarajan. "Role recommender-RBAC: Optimizing user-role assignments in RBAC." Computer Communications 166 (January 2021): 140–53. http://dx.doi.org/10.1016/j.comcom.2020.12.006.
Full textBonatti, Piero, Clemente Galdi, and Davide Torres. "Event-driven RBAC." Journal of Computer Security 23, no. 6 (December 2, 2015): 709–57. http://dx.doi.org/10.3233/jcs-150539.
Full textJoshi, Jyoti. "Improved & Extended-RBAC (Jv-RBAC) Model with X.509 Authentication." Computer Science & Engineering: An International Journal 2, no. 3 (June 30, 2012): 57–66. http://dx.doi.org/10.5121/cseij.2012.2305.
Full textShuriya. B, Shuriya B., and Dr S. Sumathi Dr. S. Sumathi. "Study of an RBAC System." Indian Journal of Applied Research 3, no. 3 (October 1, 2011): 104–6. http://dx.doi.org/10.15373/2249555x/mar2013/34.
Full textWang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.
Full textKim, In-Tae, Kyung-Yong Chung, Kee-Wook Rim, and Jung-Hyun Lee. "Dynamic RBAC Model based on OSGi." Journal of the Korea Contents Association 9, no. 1 (January 28, 2009): 53–60. http://dx.doi.org/10.5392/jkca.2009.9.1.053.
Full textEditorial Office, OBM Integrative and Complementary Medicine. "An Interview with Dr. Sok Cheon Pak." OBM Integrative and Complementary Medicine 07, no. 03 (September 20, 2022): 1–4. http://dx.doi.org/10.21926/obm.icm.2203043.
Full textDarwish, Wesam, and Konstantin Beznosov. "Analysis of ANSI RBAC Support in EJB." International Journal of Secure Software Engineering 2, no. 2 (April 2011): 25–52. http://dx.doi.org/10.4018/jsse.2011040102.
Full textNyame, Gabriel, and Zhiguang Qin. "Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework." Information 11, no. 6 (June 22, 2020): 334. http://dx.doi.org/10.3390/info11060334.
Full textOoi, Soo Liang, Sok Cheon Pak, Peter S. Micalos, Emily Schupfer, Catherine Lockley, Mi Houn Park, and Sung-Joo Hwang. "The Health-Promoting Properties and Clinical Applications of Rice Bran Arabinoxylan Modified with Shiitake Mushroom Enzyme—A Narrative Review." Molecules 26, no. 9 (April 27, 2021): 2539. http://dx.doi.org/10.3390/molecules26092539.
Full textLewis, John E., Steven E. Atlas, Oscar L. Higuera, Andrea Fiallo, Ammar Rasul, Ashar Farooqi, Olga Kromo, et al. "The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease." Evidence-Based Complementary and Alternative Medicine 2018 (May 3, 2018): 1–10. http://dx.doi.org/10.1155/2018/1751583.
Full textde Carvalho Junior, Marcelo Antonio, and Paulo Bandiera-Paiva. "Health Information System Role-Based Access Control Current Security Trends and Challenges." Journal of Healthcare Engineering 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/6510249.
Full textZhang, Jian Hua, and Qiang Liu. "An Administration Iteration Problem and its Solution when Deploying the RBAC Model." Applied Mechanics and Materials 263-266 (December 2012): 1584–87. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1584.
Full textLu, Haibing, Yuan Hong, Yanjiang Yang, Lian Duan, and Nazia Badar. "Towards user-oriented RBAC model." Journal of Computer Security 23, no. 1 (March 15, 2015): 107–29. http://dx.doi.org/10.3233/jcs-140519.
Full textChen, Hsing-Chung, Marsha Anjanette Violetta, and Cheng-Ying Yang. "Contract RBAC in cloud computing." Journal of Supercomputing 66, no. 2 (October 1, 2013): 1111–31. http://dx.doi.org/10.1007/s11227-013-1017-5.
Full textHabib, Muhammad Asif, and Qaisar Abbas. "Mutually exclusive permissions in RBAC." International Journal of Internet Technology and Secured Transactions 4, no. 2/3 (2012): 207. http://dx.doi.org/10.1504/ijitst.2012.047962.
Full textBertino, Elisa. "RBAC models — concepts and trends." Computers & Security 22, no. 6 (September 2003): 511–14. http://dx.doi.org/10.1016/s0167-4048(03)00609-6.
Full textZhao, Yu Lan, and Chun Feng Jiang. "Research of Access Control Models in Personal Networks." Advanced Materials Research 989-994 (July 2014): 4751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4751.
Full textLewis, John E., Steven E. Atlas, Oscar L. Higuera, Andrea Fiallo, Ammar Rasul, Ashar Farooqi, Olga Kromo, et al. "Corrigendum to “The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease”." Evidence-Based Complementary and Alternative Medicine 2020 (April 7, 2020): 1–10. http://dx.doi.org/10.1155/2020/9575878.
Full textWainer, Jacques, Paulo Barthelmess, and Akhil Kumar. "W-RBAC — A Workflow Security Model Incorporating Controlled Overriding of Constraints." International Journal of Cooperative Information Systems 12, no. 04 (December 2003): 455–85. http://dx.doi.org/10.1142/s0218843003000814.
Full textAftab, Muhammad Umar, Zhiguang Qin, Negalign Wake Hundera, Oluwasanmi Ariyo, Zakria, Ngo Tung Son, and Tran Van Dinh. "Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model." Symmetry 11, no. 5 (May 15, 2019): 669. http://dx.doi.org/10.3390/sym11050669.
Full textTian, Wan Li, Lian Zhong Liu, and Meng Liu. "Roles Generation for Applications in RBAC Model." Applied Mechanics and Materials 411-414 (September 2013): 35–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.35.
Full textPanzarini, Elisa, Valentina Inguscio, and Luciana Dini. "Overview of Cell Death Mechanisms Induced by Rose Bengal Acetate-Photodynamic Therapy." International Journal of Photoenergy 2011 (2011): 1–11. http://dx.doi.org/10.1155/2011/713726.
Full textLIN, CHIH-MIN, ANG-BUNG TING, CHUN-FEI HSU, and CHAO-MING CHUNG. "ADAPTIVE CONTROL FOR MIMO UNCERTAIN NONLINEAR SYSTEMS USING RECURRENT WAVELET NEURAL NETWORK." International Journal of Neural Systems 22, no. 01 (February 2012): 37–50. http://dx.doi.org/10.1142/s0129065712002992.
Full textRashid, Mamoon, and Er Rishma Chawla. "Securing Data Storage By Extending Role-Based Access Control." International Journal of Cloud Applications and Computing 3, no. 4 (October 2013): 28–37. http://dx.doi.org/10.4018/ijcac.2013100103.
Full textKUHLMANN, MIRCO, KARSTEN SOHR, and MARTIN GOGOLLA. "Employing UML and OCL for designing and analysing role-based access control." Mathematical Structures in Computer Science 23, no. 4 (July 8, 2013): 796–833. http://dx.doi.org/10.1017/s0960129512000266.
Full textChen, Hsing-Chung, Marsha Violetta, Chien-Erh Weng, and Tzu-Liang Kung. "Cognitive RBAC in mobile heterogeneous networks." Computer Science and Information Systems 10, no. 2 (2013): 779–806. http://dx.doi.org/10.2298/csis121110034c.
Full textCelikel, Ebru, Murat Kantarcioglu, Bhavani Thuraisingham, and Elisa Bertino. "A risk management approach to RBAC." Risk and Decision Analysis 1, no. 1 (2009): 21–33. http://dx.doi.org/10.3233/rda-2008-0002.
Full textBOUADJEMI, Abdelkrim, and Mustapha Kamel ABDI. "Towards An Extension Of RBAC Model." International Journal of Computing and Digital Systems 10, no. 1 (November 25, 2021): 1145–55. http://dx.doi.org/10.12785/ijcds/1001103.
Full textBaek, Kyeong-Dong, and Dong-Gue Park. "Emergency RBAC System based on Blockchain." Journal of Korean Institute of Information Technology 20, no. 3 (March 31, 2022): 79–93. http://dx.doi.org/10.14801/jkiit.2022.20.3.79.
Full textBatra, Gunjan, Vijayalakshmi Atluri, Jaideep Vaidya, and Shamik Sural. "Deploying ABAC policies using RBAC systems." Journal of Computer Security 27, no. 4 (July 18, 2019): 483–506. http://dx.doi.org/10.3233/jcs-191315.
Full textCai, Ting, Jian Zheng, and Xing Du. "A Hybrid Attribute based RBAC Model." International Journal of Security and Its Applications 9, no. 7 (July 31, 2015): 317–28. http://dx.doi.org/10.14257/ijsia.2015.9.7.29.
Full textHe, Yongzhong. "Implementing Chinese Wall Policies on RBAC." Journal of Computer Research and Development 44, no. 4 (2007): 615. http://dx.doi.org/10.1360/crad20070410.
Full textHe, Yongzhong. "Implementing Chinese Wall Policies on RBAC." Journal of Computer Research and Development 44, no. 5 (2007): 615. http://dx.doi.org/10.1360/crad20070510.
Full textChen, Hsing Chung. "A negotiation-based cooperative RBAC scheme." International Journal of Web and Grid Services 13, no. 1 (2017): 94. http://dx.doi.org/10.1504/ijwgs.2017.082076.
Full textChen, Hsing Chung. "A negotiation-based cooperative RBAC scheme." International Journal of Web and Grid Services 13, no. 1 (2017): 94. http://dx.doi.org/10.1504/ijwgs.2017.10002866.
Full textBen-Ghorbel-Talbi, Meriam, Frédéric Cuppens, Nora Cuppens-Boulahia, and Adel Bouhoula. "A delegation model for extended RBAC." International Journal of Information Security 9, no. 3 (May 1, 2010): 209–36. http://dx.doi.org/10.1007/s10207-010-0104-3.
Full textKoch, Manuel, Luigi V. Mancini, and Francesco Parisi-Presicce. "A graph-based formalism for RBAC." ACM Transactions on Information and System Security 5, no. 3 (August 2002): 332–65. http://dx.doi.org/10.1145/545186.545191.
Full textWei, Qiang, Jason Crampton, Konstantin Beznosov, and Matei Ripeanu. "Authorization recycling in hierarchical RBAC systems." ACM Transactions on Information and System Security 14, no. 1 (May 2011): 1–29. http://dx.doi.org/10.1145/1952982.1952985.
Full textColantonio, Alessandro, Roberto Di Pietro, Alberto Ocello, and Nino Vincenzo Verde. "Taming role mining complexity in RBAC." Computers & Security 29, no. 5 (July 2010): 548–64. http://dx.doi.org/10.1016/j.cose.2010.01.001.
Full textSong, Wan Li, Hai Fei Zhang, Wei Feng Wu, and Wen Jie He. "An Improved RBAC Model and its Application in Development of Information System." Advanced Materials Research 989-994 (July 2014): 4650–53. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4650.
Full textDas, Dipta, Andrew Walker, Vincent Bushong, Jan Svacina, Tomas Cerny, and Vashek Matyas. "On automated RBAC assessment by constructing a centralized perspective for microservice mesh." PeerJ Computer Science 7 (February 1, 2021): e376. http://dx.doi.org/10.7717/peerj-cs.376.
Full textLiu, Kui, Zhurong Zhou, Qianguo Chen, and Xiaoli Yang. "Towards a RBAC Workflow Model for Thesis Management." Journal of Software 10, no. 4 (April 2015): 480–90. http://dx.doi.org/10.17706/jsw.10.4.480-490.
Full textHwang, Jeong-Hee, Moon-Sun Shin, Jong-Yun Lee, and Ik-Soo Hwang. "RBAC Based Security Model for International Logistic Service." KIPS Transactions:PartC 16C, no. 3 (June 30, 2009): 307–16. http://dx.doi.org/10.3745/kipstc.2009.16-c.3.307.
Full textFragkos, Georgios, Jay Johnson, and Eirini Eleni Tsiropoulou. "Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations." Energies 15, no. 17 (September 1, 2022): 6375. http://dx.doi.org/10.3390/en15176375.
Full textYang, Jiyong, Xiajiong Shen, Wan Chen, Qiang Ge, Lei Zhang, and HaoLin Chen. "A Model Study on Collaborative Learning and Exploration of RBAC Roles." Wireless Communications and Mobile Computing 2021 (June 24, 2021): 1–9. http://dx.doi.org/10.1155/2021/5549109.
Full textDeng, Ji Qiu, Xiao Qing Luo, and Huang Ling Gu. "The Design and Implementation of G-RBAC Model in Map Permission." Advanced Materials Research 268-270 (July 2011): 1457–61. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1457.
Full text