Journal articles on the topic 'RBAC'

To see the other types of publications on this topic, follow the link: RBAC.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'RBAC.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mitra, Barsha, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri. "Migrating from RBAC to temporal RBAC." IET Information Security 11, no. 5 (September 1, 2017): 294–300. http://dx.doi.org/10.1049/iet-ifs.2016.0258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Gang, Runnan Zhang, Huimin Song, Can Wang, Jinhui Liu, and Aijun Liu. "Ts-RBAC: A RBAC model with transformation." Computers & Security 60 (July 2016): 52–61. http://dx.doi.org/10.1016/j.cose.2016.03.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Damiani, Maria Luisa, Elisa Bertino, Barbara Catania, and Paolo Perlasca. "GEO-RBAC." ACM Transactions on Information and System Security 10, no. 1 (February 2007): 2. http://dx.doi.org/10.1145/1210263.1210265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rao, K. Rajesh, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, and Muttukrishnan Rajarajan. "Role recommender-RBAC: Optimizing user-role assignments in RBAC." Computer Communications 166 (January 2021): 140–53. http://dx.doi.org/10.1016/j.comcom.2020.12.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bonatti, Piero, Clemente Galdi, and Davide Torres. "Event-driven RBAC." Journal of Computer Security 23, no. 6 (December 2, 2015): 709–57. http://dx.doi.org/10.3233/jcs-150539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Joshi, Jyoti. "Improved & Extended-RBAC (Jv-RBAC) Model with X.509 Authentication." Computer Science & Engineering: An International Journal 2, no. 3 (June 30, 2012): 57–66. http://dx.doi.org/10.5121/cseij.2012.2305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shuriya. B, Shuriya B., and Dr S. Sumathi Dr. S. Sumathi. "Study of an RBAC System." Indian Journal of Applied Research 3, no. 3 (October 1, 2011): 104–6. http://dx.doi.org/10.15373/2249555x/mar2013/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.

Full text
Abstract:
The normal role-based access control (RBAC) model decouples users and permissions through roles,and different software systems have different implementation syteles.The paper proposes an engine model which can configure the RBAC management systems flexibly.It is a configuration tool to generate different RBAC management systems which meet different users’ requirements. The practice proves that the engine model can improve the efficiency and quality of software development. The role-based access control model decouples users and permissions through roles in order to simplify authorized operations and safety management[1]. Many literatures[2-6] discuss the RBAC model from different aspects. Some literatures[2-3] add new elements to the normal RBAC model,and these models are unidimensional according to the manipulated resources.For example, the NIST RBAC reference model [2] extends and standardize the RBAC96 [1] model reasonably.Some literatures[4-5] introduce time property to RBAC model and they are two-dimensional models according to the manipulated resources.Literature[6] furtherly add visual data muster to RBAC model and proposes a three-dimensional access control model. All of these models only discuss access control model theoretically,and different role-based access control modules in software systems have different instantiation sytles.For example, a RBAC module in one software system can not meet the access control requirements in another system because different RBAC modules have different table fields in order to realize certain requirements. This paper proposes a flexible role-based access control engine which can configure the RBAC module for different systmes according to each customer’s requirement.The engine is a configuration tool and it can realize various RBAC modules which have different table fields in database.The paper is organized as follows.Section I introduces the basic concepts of the NIST RBAC model;Seciton II details the description of RBAC engine model and gives the configuration steps using this engine to generate RBAC instances,and at last section III gives an example and concludes the paper.
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, In-Tae, Kyung-Yong Chung, Kee-Wook Rim, and Jung-Hyun Lee. "Dynamic RBAC Model based on OSGi." Journal of the Korea Contents Association 9, no. 1 (January 28, 2009): 53–60. http://dx.doi.org/10.5392/jkca.2009.9.1.053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Editorial Office, OBM Integrative and Complementary Medicine. "An Interview with Dr. Sok Cheon Pak." OBM Integrative and Complementary Medicine 07, no. 03 (September 20, 2022): 1–4. http://dx.doi.org/10.21926/obm.icm.2203043.

Full text
Abstract:
Interview with Dr. Sok Cheon Pak.<strong> </strong>Dr Pak as a physiologist currently leads and guides research into nutraceuticals to provide relevant and impactful clinical applications. The best example is the rice bran arabinoxylan compound (RBAC). RBAC is a functional food produced from hydrolysed rice bran denatured with shiitake mushroom enzymes. RBAC demonstrates strong immunomodulatory properties, particularly for enhancing the natural killer cell activity. Additionally, RBAC is a potent antiproliferative food supplement with strong evidence showing that it can arrest tumour proliferation. Dr Pak has recently published a book on RBAC.
APA, Harvard, Vancouver, ISO, and other styles
11

Darwish, Wesam, and Konstantin Beznosov. "Analysis of ANSI RBAC Support in EJB." International Journal of Secure Software Engineering 2, no. 2 (April 2011): 25–52. http://dx.doi.org/10.4018/jsse.2011040102.

Full text
Abstract:
This paper analyzes access control mechanisms of the Enterprise Java Beans (EJB) architecture and defines a configuration of the EJB protection system in a more precise and less ambiguous language than the EJB 3.0 standard. Using this configuration, the authors suggest an algorithm that formally specifies the semantics of authorization decisions in EJB. The level of support is analyzed for the American National Standard Institute’s (ANSI) specification of Role-Based Access Control (RBAC) components and functional specification in EJB. The results indicate that the EJB specification falls short of supporting even Core ANSI RBAC. EJB extensions dependent on the operational environment are required in order to support ANSI RBAC required components. Other vendor-specific extensions are necessary to support ANSI RBAC optional components. Fundamental limitations exist, however, due to the impracticality of some aspects of the ANSI RBAC standard itself. This paper sets up a framework for assessing implementations of ANSI RBAC for EJB systems.
APA, Harvard, Vancouver, ISO, and other styles
12

Nyame, Gabriel, and Zhiguang Qin. "Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework." Information 11, no. 6 (June 22, 2020): 334. http://dx.doi.org/10.3390/info11060334.

Full text
Abstract:
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations. As a socio-technical concept, the notion of role in RBAC has been overemphasized, while very little attention is given to the precursors: role strain, role ambiguity, and role conflict. These constructs provide more significant insights into RBAC design in Knowledge Management Systems (KMS). KMS is the technology-based knowledge management tool used to acquire, store, share, and apply knowledge for improved collaboration and knowledge-value creation. In this paper, we propose eight propositions that require future research concerning the RBAC system for knowledge security. In addition, we propose a model that integrates these precursors and RBAC to deepen the understanding of these constructs. Further, we examine these precursory constructs in a socio-technical fashion relative to RBAC in the organizational context and the status–role relationship effects. We carried out conceptual analysis and synthesis of the relevant literature, and present a model that involves the three essential precursors that play crucial roles in role mining and engineering in RBAC design. Using an illustrative case study of two companies where 63 IT professionals participated in the study, the study established that the precursors positively and significantly increase the intractability of the RBAC system design. Our framework draws attention to both the management of organizations and RBAC system developers about the need to consider and analyze the precursors thoroughly before initiating the processes of policy engineering, role mining, and role engineering. The propositions stated in this study are important considerations for future work.
APA, Harvard, Vancouver, ISO, and other styles
13

Ooi, Soo Liang, Sok Cheon Pak, Peter S. Micalos, Emily Schupfer, Catherine Lockley, Mi Houn Park, and Sung-Joo Hwang. "The Health-Promoting Properties and Clinical Applications of Rice Bran Arabinoxylan Modified with Shiitake Mushroom Enzyme—A Narrative Review." Molecules 26, no. 9 (April 27, 2021): 2539. http://dx.doi.org/10.3390/molecules26092539.

Full text
Abstract:
Rice bran arabinoxylan compound (RBAC) is derived from defatted rice bran hydrolyzed with Lentinus edodes mycelial enzyme. It has been marketed as a functional food and a nutraceutical with health-promoting properties. Some research has demonstrated this rice bran derivative to be a potent immunomodulator, which also possesses anti-inflammatory, antioxidant, and anti-angiogenic properties. To date, research on RBAC has predominantly focused on its immunomodulatory action and application as a complementary therapy for cancer. Nonetheless, the clinical applications of RBAC can extend beyond cancer therapy. This article is a narrative review of the research on the potential benefits of RBAC for cancer and other health conditions based on the available literature. RBAC research has shown it to be useful as a complementary treatment for cancer and human immunodeficiency virus infection. It can positively modulate serum glucose, lipid and protein metabolism in diabetic patients. Additionally, RBAC has been shown to ameliorate irritable bowel syndrome and protect against liver injury caused by hepatitis or nonalcoholic fatty liver disease. It can potentially ease symptoms in chronic fatigue syndrome and prevent the common cold. RBAC is safe to consume and has no known side effects at the typical dosage of 2–3 g/day. Nevertheless, further research in both basic studies and human clinical trials are required to investigate the clinical applications, mechanisms, and effects of RBAC.
APA, Harvard, Vancouver, ISO, and other styles
14

Lewis, John E., Steven E. Atlas, Oscar L. Higuera, Andrea Fiallo, Ammar Rasul, Ashar Farooqi, Olga Kromo, et al. "The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease." Evidence-Based Complementary and Alternative Medicine 2018 (May 3, 2018): 1–10. http://dx.doi.org/10.1155/2018/1751583.

Full text
Abstract:
The primary objective of the study was to evaluate the effect of a hydrolyzed polysaccharide, Rice Bran Arabinoxylan Compound (RBAC), on biomarkers in adults with nonalcoholic fatty liver disease (NAFLD). A 90-day randomized double-blind placebo-controlled trial examined the effect of RBAC on complete blood count, liver enzymes, lipids, oxidative stress markers, cytokines, and growth factors. Twenty-three adults with NAFLD were enrolled and randomly assigned to one of the two study conditions (n=12 RBAC and n=11 placebo) and consumed 1 gram/day of either compound for 90 days. Subjects were assessed at baseline and 45 and 90 days. No adverse effects were reported. Alkaline phosphatase significantly decreased (−3.1%; SD=19.9; F[1,19]=5.1, p=0.03) in the RBAC group compared to the placebo group. The percentages of monocytes (17.9%; SD=18.3; F[1,19]=5.9, p=0.02) and eosinophils (30.6%; SD=30.5; F[1,19]=12.3, p<0.01) increased in the RBAC group. IFN-γ (156%; SD=131.8; F[1,19]=4.2, p=0.06) and IL-18 (29.1%; SD=64; F[1,19]=5.3, p=0.03) increased in the RBAC group compared to the placebo group. Other improvements were noted for platelets, neutrophils, neutrophil-lymphocyte ratio, γ-glutamyl transferase, and 4-hydroxynonenal. RBAC had beneficial effects on several biomarkers that adds to the known immunomodulatory activities of RBAC, which may be promising for people with NAFLD.
APA, Harvard, Vancouver, ISO, and other styles
15

de Carvalho Junior, Marcelo Antonio, and Paulo Bandiera-Paiva. "Health Information System Role-Based Access Control Current Security Trends and Challenges." Journal of Healthcare Engineering 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/6510249.

Full text
Abstract:
Objective. This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. Method. We have selected articles related to our investigation theme “RBAC trends and limitations” in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: “Role-Based Access Control” OR “RBAC” AND “Health information System” OR “EHR” AND “Trends” OR “Challenges” OR “Security” OR “Authorization” OR “Attacks” OR “Permission Assignment” OR “Permission Relation” OR “Permission Mapping” OR “Constraint”. We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. Results. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Conclusion. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.
APA, Harvard, Vancouver, ISO, and other styles
16

Zhang, Jian Hua, and Qiang Liu. "An Administration Iteration Problem and its Solution when Deploying the RBAC Model." Applied Mechanics and Materials 263-266 (December 2012): 1584–87. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1584.

Full text
Abstract:
Access control is an important infrastructure of an information system. Role-Based Access Control (RBAC) model is the main-stream access control model. When deploying a RBAC model, there is an administration iteration problem which needs the information engineers to define the administrator structure before running the RBAC model, which make the deploying process redundancy and complex, make the running process rigid, and result in decrease of control capability of RBAC model. We present a top-down method. In this method, we define the administration authority as the source of management authority and set up the right and liability mechanism of RBAC. By this method, the administrator structure will be defined and expanded by administrators according to application requirements, and the right and liability mechanism can make sure these administrators should perform their management authorities responsibly and legally. Our method can solve the administration iteration problem and improve the flexibility of RBAC model.
APA, Harvard, Vancouver, ISO, and other styles
17

Lu, Haibing, Yuan Hong, Yanjiang Yang, Lian Duan, and Nazia Badar. "Towards user-oriented RBAC model." Journal of Computer Security 23, no. 1 (March 15, 2015): 107–29. http://dx.doi.org/10.3233/jcs-140519.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Chen, Hsing-Chung, Marsha Anjanette Violetta, and Cheng-Ying Yang. "Contract RBAC in cloud computing." Journal of Supercomputing 66, no. 2 (October 1, 2013): 1111–31. http://dx.doi.org/10.1007/s11227-013-1017-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Habib, Muhammad Asif, and Qaisar Abbas. "Mutually exclusive permissions in RBAC." International Journal of Internet Technology and Secured Transactions 4, no. 2/3 (2012): 207. http://dx.doi.org/10.1504/ijitst.2012.047962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Bertino, Elisa. "RBAC models — concepts and trends." Computers & Security 22, no. 6 (September 2003): 511–14. http://dx.doi.org/10.1016/s0167-4048(03)00609-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zhao, Yu Lan, and Chun Feng Jiang. "Research of Access Control Models in Personal Networks." Advanced Materials Research 989-994 (July 2014): 4751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4751.

Full text
Abstract:
How to prevent illegal users from sharing system resources was one of the main purposes for MAGNET Security Group. This paper introduced some major access control models such as traditional access control models, role-based access control model (RBAC), task-based access control model (TBAC) and role-task-based access control model (T-RBAC). In the end, a feasible scheme PN_T-RBAC was proposed at the base of the T-RBAC model in existence, which was suitable for the coalition environment of personal networks.
APA, Harvard, Vancouver, ISO, and other styles
22

Lewis, John E., Steven E. Atlas, Oscar L. Higuera, Andrea Fiallo, Ammar Rasul, Ashar Farooqi, Olga Kromo, et al. "Corrigendum to “The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease”." Evidence-Based Complementary and Alternative Medicine 2020 (April 7, 2020): 1–10. http://dx.doi.org/10.1155/2020/9575878.

Full text
Abstract:
The primary objective of the study was to evaluate the effect of a hydrolyzed polysaccharide, Rice Bran Arabinoxylan Compound (RBAC), on biomarkers in adults with nonalcoholic fatty liver disease (NAFLD). A 90-day randomized double-blind placebo-controlled trial examined the effect of RBAC on complete blood count, liver enzymes, lipids, oxidative stress markers, cytokines, and growth factors. Twenty-three adults with NAFLD were enrolled and randomly assigned to one of the two study conditions (n = 12 RBAC and n = 11 placebo) and consumed 1 gram/day of either compound for 90 days. Subjects were assessed at baseline and 45 and 90 days. No adverse effects were reported. Alkaline phosphatase significantly decreased (−3.1%; SD = 19.9; F[1, 19] = 5.1, p=0.03) in the RBAC group compared to placebo. Percent monocytes (17.9%; SD = 18.3; F[1, 19] = 5.9, p=0.02) and percent eosinophils (30.6%; SD = 30.5; F[1, 19] = 12.3, p<0.01) increased in the RBAC group. IFN-γ (156%; SD = 131.8; F[1, 19] = 4.2, p=0.06) and IL-18 (29.1%; SD = 64; F[1, 19] = 5.3, p=0.03) increased in the RBAC group compared to placebo. Other improvements were noted for platelets, neutrophils, neutrophil-lymphocyte ratio, γ-glutamyl transferase, and 4-hydroxynonenal. RBAC had beneficial effects on several biomarkers that add to the known immunomodulatory activities of RBAC, which may be promising for people with NAFLD. This trial is registered with NCT02568787.
APA, Harvard, Vancouver, ISO, and other styles
23

Wainer, Jacques, Paulo Barthelmess, and Akhil Kumar. "W-RBAC — A Workflow Security Model Incorporating Controlled Overriding of Constraints." International Journal of Cooperative Information Systems 12, no. 04 (December 2003): 455–85. http://dx.doi.org/10.1142/s0218843003000814.

Full text
Abstract:
This paper presents a pair of role-based access control models for workflow systems, collectively known as the W-RBAC models. The first of these models, W0-RBAC is based on a framework that couples a powerful RBAC-based permission service and a workflow component with clear separation of concerns for ease of administration of authorizations. The permission service is the focus of the work, providing an expressive logic-based language for the selection of users authorized to perform workflow tasks, with preference ranking. W1-RBAC extends the basic model by incorporating exception handling capabilities through controlled and systematic overriding of constraints.
APA, Harvard, Vancouver, ISO, and other styles
24

Aftab, Muhammad Umar, Zhiguang Qin, Negalign Wake Hundera, Oluwasanmi Ariyo, Zakria, Ngo Tung Son, and Tran Van Dinh. "Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model." Symmetry 11, no. 5 (May 15, 2019): 669. http://dx.doi.org/10.3390/sym11050669.

Full text
Abstract:
A major development in the field of access control is the dominant role-based access control (RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the concept of roles. In addition, attribute-based access control (ABAC) is added to the access control models, which is famous for its dynamic behavior. Separation of duty (SOD) is used for enforcing least privilege concept in RBAC and ABAC. Moreover, SOD is a powerful tool that is used to protect an organization from internal security attacks and threats. Different problems have been found in the implementation of SOD at the role level. This paper discusses that the implementation of SOD on the level of roles is not a good option. Therefore, this paper proposes a hybrid access control model to implement SOD on the basis of permissions. The first part of the proposed model is based on the addition of attributes with dynamic characteristics in the RBAC model, whereas the second part of the model implements the permission-based SOD in dynamic RBAC model. Moreover, in comparison with previous models, performance and feature analysis are performed to show the strength of dynamic RBAC model. This model improves the performance of the RBAC model in terms of time, dynamicity, and automatic permissions and roles assignment. At the same time, this model also reduces the administrator’s load and provides a flexible, dynamic, and secure access control model.
APA, Harvard, Vancouver, ISO, and other styles
25

Tian, Wan Li, Lian Zhong Liu, and Meng Liu. "Roles Generation for Applications in RBAC Model." Applied Mechanics and Materials 411-414 (September 2013): 35–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.35.

Full text
Abstract:
RBAC has been widely used for the reason of its efficiency, convenience and safety. But as the traditional user-oriented access control strategy, the RBAC carries the disadvantage of user-oriented access control as well. It always assumes that the application is credible and the behavior of the program represents the wishes of the user. However, this assumption is increasingly proving to be false and numbers of prevalent types of security attacks leverage this weakness to misuse the authority of users. Based on RBAC and learn from the concept of FBAC, this paper will proposed a solution about generating roles for application.
APA, Harvard, Vancouver, ISO, and other styles
26

Panzarini, Elisa, Valentina Inguscio, and Luciana Dini. "Overview of Cell Death Mechanisms Induced by Rose Bengal Acetate-Photodynamic Therapy." International Journal of Photoenergy 2011 (2011): 1–11. http://dx.doi.org/10.1155/2011/713726.

Full text
Abstract:
Photodynamic Therapy (PDT) is a non-invasive treatment for different pathologies, cancer included, using three key components: non-toxic light-activated drug (Photosensitizer, PS), visible light, and oxygen. Their interaction triggers photochemical reactions leading to Reactive Oxygen Species (ROS) generation, that mediate cytotoxicity and cell death. In the present paper, the most important findings about the synthetic dye Rose Bengal Acetate (RBAc), an emerging photosensitizer for its efficient induction of cell death, will be reported with the aim to integrate RBAc phototoxicity to novel therapeutic PDT strategies against tumour cells. After its perinuclear intracellular localization, RBAc causes multiple subcellular organelles damage, that is, mitochondria, Endoplasmic Reticulum (ER), lysosomes, and Golgi complex. Indeed, RBAc exerts long-term phototoxicity through activation of both caspase-independent and- dependent apoptotic pathways and autophagic cell death. In particular, this latter cell death type may promote cell demise when apoptotic machinery is defective. The deep knowledge of RBAc photocytotoxicity will allow to better understand its potential photomedicine application in cancer.
APA, Harvard, Vancouver, ISO, and other styles
27

LIN, CHIH-MIN, ANG-BUNG TING, CHUN-FEI HSU, and CHAO-MING CHUNG. "ADAPTIVE CONTROL FOR MIMO UNCERTAIN NONLINEAR SYSTEMS USING RECURRENT WAVELET NEURAL NETWORK." International Journal of Neural Systems 22, no. 01 (February 2012): 37–50. http://dx.doi.org/10.1142/s0129065712002992.

Full text
Abstract:
Recurrent wavelet neural network (RWNN) has the advantages such as fast learning property, good generalization capability and information storing ability. With these advantages, this paper proposes an RWNN-based adaptive control (RBAC) system for multi-input multi-output (MIMO) uncertain nonlinear systems. The RBAC system is composed of a neural controller and a bounding compensator. The neural controller uses an RWNN to online mimic an ideal controller, and the bounding compensator can provide smooth and chattering-free stability compensation. From the Lyapunov stability analysis, it is shown that all signals in the closed-loop RBAC system are uniformly ultimately bounded. Finally, the proposed RBAC system is applied to the MIMO uncertain nonlinear systems such as a mass-spring-damper mechanical system and a two-link robotic manipulator system. Simulation results verify that the proposed RBAC system can achieve favorable tracking performance with desired robustness without any chattering phenomenon in the control effort.
APA, Harvard, Vancouver, ISO, and other styles
28

Rashid, Mamoon, and Er Rishma Chawla. "Securing Data Storage By Extending Role-Based Access Control." International Journal of Cloud Applications and Computing 3, no. 4 (October 2013): 28–37. http://dx.doi.org/10.4018/ijcac.2013100103.

Full text
Abstract:
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, the authors highlight the drawbacks of RBAC models in terms of access control and authorization and later provide a more viable extended-RBAC model, which enhances and extends its powers to make any Cloud Server more secure by adding valuable constraints. Later the Blobs are stored on cloud server which is then accessed by the end users via this Extended RBAC model. The authors describe a practical implementation of the proposed extended RBAC based architecture and discuss the performance results with its base models. The authors later show how the users with different premiums can access this architecture in a better way and also how the unknown users for this architecture can be denied the usage of services by adding valuable constraints.
APA, Harvard, Vancouver, ISO, and other styles
29

KUHLMANN, MIRCO, KARSTEN SOHR, and MARTIN GOGOLLA. "Employing UML and OCL for designing and analysing role-based access control." Mathematical Structures in Computer Science 23, no. 4 (July 8, 2013): 796–833. http://dx.doi.org/10.1017/s0960129512000266.

Full text
Abstract:
The stringent security requirements of organisations like banks or hospitals frequently adopt role-based access control (RBAC) principles to represent and simplify their internal permission management. While representing a fundamental advanced RBAC concept enabling precise restrictions on access rights, authorisation constraints increase the complexity of the resulting security policies so that tool support for convenient creation and adequate validation is required. A particular contribution of our work is a new approach to developing and analysing RBAC policies using a UML-based domain-specific language (DSL), which allows the hiding of the mathematical structures of the underlying authorisation constraints implemented in OCL. The DSL we present is highly configurable and extensible with respect to new concepts and classes of authorisation constraints, and allows the developer to validate RBAC policies in an effective way. The handling of dynamic (that is, time-dependent) constraints, their visual representation through the RBAC DSL and their analysis all form another part of our contribution. The approach is supported by a UML and OCL validation tool.
APA, Harvard, Vancouver, ISO, and other styles
30

Chen, Hsing-Chung, Marsha Violetta, Chien-Erh Weng, and Tzu-Liang Kung. "Cognitive RBAC in mobile heterogeneous networks." Computer Science and Information Systems 10, no. 2 (2013): 779–806. http://dx.doi.org/10.2298/csis121110034c.

Full text
Abstract:
In communication networks, a cognitive network (CN) is a new type of data network which is used to solve some of the problems that face current networks. Cognitive radio (CR) is part of a cognitive network and a smart wireless communication system. CR is conscious of its surrounding environment, and learns from the environment. It adapts its internal states by making corresponding real-time changes in certain operating parameters. In this paper, we propose a novel Cognitive RBAC (Role-Based Access Control) scheme which can be applied to Mobile Heterogeneous Networks (MHNs). The MHNs consist of mobile communication systems and Wi-Fi systems. The required new definitions for the RBAC model are proposed in this paper. They can improve the ability of conventional RBAC model to meet new challenges. In our scheme, we assume that a Cognitive Server (CS) provides and manages the permissions of services, and Network Providers support and manage a variety CRs and CNs, individually. For more efficiently managing CR and CN and meeting the large scale heterogeneous networks, we let mobile user can perceive network candidate actively to access services, in which the permissions are depending to the contract made by CS with each Network Provider. In this paper, the new generalized cognitive RBAC model and their definitions are proposed, and could be applied to new applications in a MHNs environment.
APA, Harvard, Vancouver, ISO, and other styles
31

Celikel, Ebru, Murat Kantarcioglu, Bhavani Thuraisingham, and Elisa Bertino. "A risk management approach to RBAC." Risk and Decision Analysis 1, no. 1 (2009): 21–33. http://dx.doi.org/10.3233/rda-2008-0002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

BOUADJEMI, Abdelkrim, and Mustapha Kamel ABDI. "Towards An Extension Of RBAC Model." International Journal of Computing and Digital Systems 10, no. 1 (November 25, 2021): 1145–55. http://dx.doi.org/10.12785/ijcds/1001103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Baek, Kyeong-Dong, and Dong-Gue Park. "Emergency RBAC System based on Blockchain." Journal of Korean Institute of Information Technology 20, no. 3 (March 31, 2022): 79–93. http://dx.doi.org/10.14801/jkiit.2022.20.3.79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Batra, Gunjan, Vijayalakshmi Atluri, Jaideep Vaidya, and Shamik Sural. "Deploying ABAC policies using RBAC systems." Journal of Computer Security 27, no. 4 (July 18, 2019): 483–506. http://dx.doi.org/10.3233/jcs-191315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Cai, Ting, Jian Zheng, and Xing Du. "A Hybrid Attribute based RBAC Model." International Journal of Security and Its Applications 9, no. 7 (July 31, 2015): 317–28. http://dx.doi.org/10.14257/ijsia.2015.9.7.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

He, Yongzhong. "Implementing Chinese Wall Policies on RBAC." Journal of Computer Research and Development 44, no. 4 (2007): 615. http://dx.doi.org/10.1360/crad20070410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

He, Yongzhong. "Implementing Chinese Wall Policies on RBAC." Journal of Computer Research and Development 44, no. 5 (2007): 615. http://dx.doi.org/10.1360/crad20070510.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Hsing Chung. "A negotiation-based cooperative RBAC scheme." International Journal of Web and Grid Services 13, no. 1 (2017): 94. http://dx.doi.org/10.1504/ijwgs.2017.082076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Chen, Hsing Chung. "A negotiation-based cooperative RBAC scheme." International Journal of Web and Grid Services 13, no. 1 (2017): 94. http://dx.doi.org/10.1504/ijwgs.2017.10002866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ben-Ghorbel-Talbi, Meriam, Frédéric Cuppens, Nora Cuppens-Boulahia, and Adel Bouhoula. "A delegation model for extended RBAC." International Journal of Information Security 9, no. 3 (May 1, 2010): 209–36. http://dx.doi.org/10.1007/s10207-010-0104-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Koch, Manuel, Luigi V. Mancini, and Francesco Parisi-Presicce. "A graph-based formalism for RBAC." ACM Transactions on Information and System Security 5, no. 3 (August 2002): 332–65. http://dx.doi.org/10.1145/545186.545191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Wei, Qiang, Jason Crampton, Konstantin Beznosov, and Matei Ripeanu. "Authorization recycling in hierarchical RBAC systems." ACM Transactions on Information and System Security 14, no. 1 (May 2011): 1–29. http://dx.doi.org/10.1145/1952982.1952985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Colantonio, Alessandro, Roberto Di Pietro, Alberto Ocello, and Nino Vincenzo Verde. "Taming role mining complexity in RBAC." Computers & Security 29, no. 5 (July 2010): 548–64. http://dx.doi.org/10.1016/j.cose.2010.01.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Song, Wan Li, Hai Fei Zhang, Wei Feng Wu, and Wen Jie He. "An Improved RBAC Model and its Application in Development of Information System." Advanced Materials Research 989-994 (July 2014): 4650–53. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4650.

Full text
Abstract:
Aiming at the deficiencies of traditional RBAC model, on the basis of studying of the models introduced in the literatures published, this paper puts forwards an improved model--MR-RBAC, including its concepts and design. This model is implemented by adding restriction strategy on the operation objects and data objects, assignment different privileges to different users via configuration mapping of functions and menus. The implementation and practice indicates that the MR-RBAC model not only simplifies privilege management, but also improves the system security and privileges management flexibility.
APA, Harvard, Vancouver, ISO, and other styles
45

Das, Dipta, Andrew Walker, Vincent Bushong, Jan Svacina, Tomas Cerny, and Vashek Matyas. "On automated RBAC assessment by constructing a centralized perspective for microservice mesh." PeerJ Computer Science 7 (February 1, 2021): e376. http://dx.doi.org/10.7717/peerj-cs.376.

Full text
Abstract:
It is important in software development to enforce proper restrictions on protected services and resources. Typically software services can be accessed through REST API endpoints where restrictions can be applied using the Role-Based Access Control (RBAC) model. However, RBAC policies can be inconsistent across services, and they require proper assessment. Currently, developers use penetration testing, which is a costly and cumbersome process for a large number of APIs. In addition, modern applications are split into individual microservices and lack a unified view in order to carry out automated RBAC assessment. Often, the process of constructing a centralized perspective of an application is done using Systematic Architecture Reconstruction (SAR). This article presents a novel approach to automated SAR to construct a centralized perspective for a microservice mesh based on their REST communication pattern. We utilize the generated views from SAR to propose an automated way to find RBAC inconsistencies.
APA, Harvard, Vancouver, ISO, and other styles
46

Liu, Kui, Zhurong Zhou, Qianguo Chen, and Xiaoli Yang. "Towards a RBAC Workflow Model for Thesis Management." Journal of Software 10, no. 4 (April 2015): 480–90. http://dx.doi.org/10.17706/jsw.10.4.480-490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Hwang, Jeong-Hee, Moon-Sun Shin, Jong-Yun Lee, and Ik-Soo Hwang. "RBAC Based Security Model for International Logistic Service." KIPS Transactions:PartC 16C, no. 3 (June 30, 2009): 307–16. http://dx.doi.org/10.3745/kipstc.2009.16-c.3.307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Fragkos, Georgios, Jay Johnson, and Eirini Eleni Tsiropoulou. "Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations." Energies 15, no. 17 (September 1, 2022): 6375. http://dx.doi.org/10.3390/en15176375.

Full text
Abstract:
A global transition to power grids with high penetrations of renewable energy generation is being driven in part by rapid installations of distributed energy resources (DER). New DER equipment includes standardized IEEE 1547-2018 communication interfaces and proprietary communications capabilities. Interoperable DER provides new monitoring and control capabilities. The existence of multiple entities with different roles and responsibilities within the DER ecosystem makes the Access Control (AC) mechanism necessary. In this paper, we introduce and compare two novel architectures, which provide a Role-Based Access Control (RBAC) service to the DER ecosystem’s entities. Selecting an appropriate RBAC technology is important for the RBAC administrator and users who request DER access authorization. The first architecture is centralized, based on the OpenLDAP, an open source implementation of the Lightweight Directory Access Protocol (LDAP). The second approach is decentralized, based on a private Ethereum blockchain test network, where the RBAC model is stored and efficiently retrieved via the utilization of a single Smart Contract. We have implemented two end-to-end Proofs-of-Concept (PoC), respectively, to offer the RBAC service to the DER entities as web applications. Finally, an evaluation of the two approaches is presented, highlighting the key speed, cost, usability, and security features.
APA, Harvard, Vancouver, ISO, and other styles
49

Yang, Jiyong, Xiajiong Shen, Wan Chen, Qiang Ge, Lei Zhang, and HaoLin Chen. "A Model Study on Collaborative Learning and Exploration of RBAC Roles." Wireless Communications and Mobile Computing 2021 (June 24, 2021): 1–9. http://dx.doi.org/10.1155/2021/5549109.

Full text
Abstract:
Role-based access control (RBAC) can effectively guarantee the security of user system data. With its good flexibility and security, RBAC occupies a mainstream position in the field of access control. However, the complexity and time-consuming of the role establishment process seriously hinder the development and application of the RBAC model. The introduction of the assistant interactive question answering algorithm based on attribute exploration (semiautomatic heuristic way to build an RBAC system) greatly reduces the complexity of building a role system. However, there are some defects in the auxiliary interactive Q&A algorithm based on attribute exploration. The algorithm is not only unable to support multiperson collaborative work but also difficult to find qualified Q&A experts in practical work. Aiming at the above problems, this paper proposes a model collaborative learning and exploration of RBAC roles under the framework of attribute exploration. In this model, after interactive Q&A with experts in different permissions systems by using attribute exploration, the obtained results are merged and calculated to get the correct role system. This model not only avoids the time-consuming process of role requirement analysis but also provides a feasible scheme for collaborative role discovery in multidepartment permissions.
APA, Harvard, Vancouver, ISO, and other styles
50

Deng, Ji Qiu, Xiao Qing Luo, and Huang Ling Gu. "The Design and Implementation of G-RBAC Model in Map Permission." Advanced Materials Research 268-270 (July 2011): 1457–61. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1457.

Full text
Abstract:
With the development of WebGIS, it plays a more and more important role in government and enterprises. The effective way to access and control spatial data, because of relating to the security and business secrets of government and enterprises, becomes an urgent concern for them. Now, RBAC (Role Based Access Control) can be a valid method to access and control uniform resource, but it is lack of flexibility and real-time ability to control spatial data in WebGIS. For that, this paper proposes G-RBAC model based on RBAC model to enhance the flexibility and real-time ability to access spatial data.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography