Academic literature on the topic 'Role based access control (RBAC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Role based access control (RBAC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Role based access control (RBAC)"
Wang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.
Full textAftab, Muhammad Umar, Zhiguang Qin, Negalign Wake Hundera, Oluwasanmi Ariyo, Zakria, Ngo Tung Son, and Tran Van Dinh. "Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model." Symmetry 11, no. 5 (May 15, 2019): 669. http://dx.doi.org/10.3390/sym11050669.
Full textRashid, Mamoon, and Er Rishma Chawla. "Securing Data Storage By Extending Role-Based Access Control." International Journal of Cloud Applications and Computing 3, no. 4 (October 2013): 28–37. http://dx.doi.org/10.4018/ijcac.2013100103.
Full textGao, Lei, and Shu Lin Pan. "Fine-Grained Access Control Model Based on RBAC." Advanced Materials Research 468-471 (February 2012): 1667–70. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1667.
Full textNyame, Gabriel, and Zhiguang Qin. "Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework." Information 11, no. 6 (June 22, 2020): 334. http://dx.doi.org/10.3390/info11060334.
Full textHuang, Dan Hua, and Ya Qian Yang. "Role-Based Risk Adaptive Access Control Model." Applied Mechanics and Materials 416-417 (September 2013): 1516–21. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1516.
Full textZhao, Yu Lan, and Chun Feng Jiang. "Research of Access Control Models in Personal Networks." Advanced Materials Research 989-994 (July 2014): 4751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4751.
Full textde Carvalho Junior, Marcelo Antonio, and Paulo Bandiera-Paiva. "Health Information System Role-Based Access Control Current Security Trends and Challenges." Journal of Healthcare Engineering 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/6510249.
Full textAbbdelkrim, Bouadjemi. "FORMAL DECISION MODELING FOR ROLE-BASED ACCESS CONTROL POLICIES." Advances in Mathematics: Scientific Journal 12, no. 3 (March 18, 2023): 465–77. http://dx.doi.org/10.37418/amsj.12.3.4.
Full textMundbrod, Nicolas, and Manfred Reichert. "Object-Specific Role-Based Access Control." International Journal of Cooperative Information Systems 28, no. 01 (March 2019): 1950003. http://dx.doi.org/10.1142/s0218843019500035.
Full textDissertations / Theses on the topic "Role based access control (RBAC)"
Khayat, Etienne J. "Role-based access control (RBAC) : formal modelling and risk-based administration." Thesis, London South Bank University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435233.
Full textSubedi, Harendra. "Mathematical Modelling of Delegation in Role Based Access Control." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381.
Full textSingh, Arundhati 1978. "SIREN : a SQL-based implementation of role-based access control (RBAC) for enterprise networks." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87870.
Full textIncludes bibliographical references (leaves 69-71).
by Arundhati Singh.
M.Eng.
Falkcrona, Jerry. "Role-based access control and single sign-on for Web services." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11224.
Full textNowadays, the need for sharing information between different systems in a secure manner is common, not only in the corporate world but also in the military world. This information often resides at different locations, creating a distributed system. In order to share information in a secure manner in a distributed system, credentials are often used to attain authorization.
This thesis examines how such a distributed system for sharing information can be realized, using the technology readily available today. Accounting to the results of this examination a basic system is implemented, after which the overall security of the system is evaluated. The thesis then presents possible extensions and improvements that can be done in future implementations.
The result shows that dynamic roles do not easily integrate with a single sign-on system. Combining the two technologies leads to several synchronization issues, where some are non-trivial to solve.
Manning, Francis Jay. "A Framework for Enforcing Role Based Access Control in Open Source Software." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/228.
Full textRondinini, Giorgia. "Role-Based Access Control in ambienti cloud multi-region." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textGunnarsson, Peter. "Role based access control in a telecommunications operations and maintenance network." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2875.
Full textEricsson develops and builds mobile telecommunication networks. These networks consists of a large number of equipment. Each telecommunication company has a staff of administrators appointed to manage respective networks.
In this thesis, we investigate the requirements for an access control model to manage the large number of permissions and equipment in telecommunication networks. Moreover, we show that the existing models do not satisfy the identified requirements. Therefore, we propose a novel RBAC model which is adapted for these conditions.
We also investigate some of the most common used commercial tools for administrating RBAC, and evaluate their effectiveness in coping with our new proposed model. However, we find the existing tools limited, and thereby design and partly implement a RBAC managing system which is better suited to the requirements posed by our new model.
Shi, Wei, and wshi2001@yahoo com au. "An Extended Role-based Access Control Model for Enterprise Systems and Web Services." RMIT University. Computer Science and Information Technology, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.122429.
Full textPoe, Gary A. "Privacy in Database Designs: A Role Based Approach." Scholar Commons, 2007. https://scholarcommons.usf.edu/etd/454.
Full textWang, Hua. "Access management in electronic commerce system." University of Southern Queensland, Faculty of Sciences, 2004. http://eprints.usq.edu.au/archive/00001522/.
Full textBooks on the topic "Role based access control (RBAC)"
Ferraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.
Find full textFerraiolo, David. Role-based access controls. Boston: Artech House, 2003.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control. and Technische Universität Berlin, eds. Proceedings, Fifth ACM Workshop on Role-Based Access Control: Berlin, Germany, July 26-27, 2000. New York, N.Y: ACM, 2000.
Find full textACM, Workshop on Role-Based Access Control (3rd 1998 Fairfax Va ). Proceedings: Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 22-23, 1998. New York, N.Y: ACM, 1998.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control., Association for Computing Machinery. Washington, D.C. Chapter., National Institute of Standards and Technology (U.S.), and George Mason University, eds. Proceedings, Fourth ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, October 28-29, 1999. New York, N.Y: ACM, 1999.
Find full textBook chapters on the topic "Role based access control (RBAC)"
Carruthers, Andrew. "Role-Based Access Control (RBAC)." In Building the Snowflake Data Cloud, 123–49. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8593-0_5.
Full textJagadeesan, Radha, Alan Jeffrey, Corin Pitcher, and James Riely. "λ-RBAC: Programming with Role-Based Access Control." In Automata, Languages and Programming, 456–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11787006_39.
Full textXu, Zhen, Dengguo Feng, Lan Li, and Hua Chen. "UC-RBAC: A Usage Constrained Role-Based Access Control Model." In Information and Communications Security, 337–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39927-8_31.
Full textJafari, Mohammad, and Mohammad Fathian. "Management Advantages of Object Classification in Role-Based Access Control (RBAC)." In Lecture Notes in Computer Science, 95–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-76929-3_11.
Full textGofman, Mikhail I., Ruiqi Luo, Ayla C. Solomon, Yingbin Zhang, Ping Yang, and Scott D. Stoller. "RBAC-PAT: A Policy Analysis Tool for Role Based Access Control." In Tools and Algorithms for the Construction and Analysis of Systems, 46–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00768-2_4.
Full textOh, Sejong, and Seog Park. "Task-Role Based Access Control (T-RBAC): An Improved Access Control Model for Enterprise Environment." In Lecture Notes in Computer Science, 264–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44469-6_25.
Full textXu, Zhiyu, Tengyun Jiao, Lin Yang, Donghai Liu, Sheng Wen, and Yang Xiang. "RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain." In Algorithms and Architectures for Parallel Processing, 439–53. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38991-8_29.
Full textKang, Jang-Mook, Jae-Sang Cha, You-Jin Song, Goo-Man Park, Eun-Young Ko, Myong-chul Shin, Jeong-Jin Kang, and You-Sik Hong. "A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control)." In Communications in Computer and Information Science, 378–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23141-4_39.
Full textMousavi, Nima, and Mahesh V. Tripunitara. "Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC)." In Network and System Security, 516–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9_39.
Full textMatulevičius, Raimundas. "Role-Based Access Control." In Fundamentals of Secure System Modelling, 147–69. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61717-6_10.
Full textConference papers on the topic "Role based access control (RBAC)"
Saffarian, Mohsen, and Babak Sadighi. "Owner-Based Role-Based Access Control OB-RBAC." In 2010 International Conference on Availability, Reliability, and Security (ARES). IEEE, 2010. http://dx.doi.org/10.1109/ares.2010.94.
Full textGunti, N., Weiqing Sun, and M. Niamat. "I-RBAC: Isolation enabled role-based access control." In 2011 Ninth Annual International Conference on Privacy, Security and Trust. IEEE, 2011. http://dx.doi.org/10.1109/pst.2011.5971967.
Full textTripunitara, Mahesh V., and Bogdan Carbunar. "Efficient access enforcement in distributed role-based access control (RBAC) deployments." In the 14th ACM symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1542207.1542232.
Full textBammigatti, Prasanna H., and Dr P. R. Rao. "GenericWA-RBAC: Role Based Access Control Model for Web Applications." In 9th International Conference on Information Technology (ICIT'06). IEEE, 2006. http://dx.doi.org/10.1109/icit.2006.57.
Full textWang, Jin, Qiang Li, and Daxing Li. "I-RBAC: An Identity& Role Based Access Control Model." In 2007 IEEE International Conference on Control and Automation. IEEE, 2007. http://dx.doi.org/10.1109/icca.2007.4376922.
Full textZhou, Yanjie, and Min Wen. "A Novel Role-Based-Access-Control(RBAC) Framework and Application." In International Conference on Education, Management and Computing Technology (ICEMCT-15). Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/icemct-15.2015.43.
Full textCao, Rongning. "Research on RBAC Based Role Access Control in Financial MIS." In 2022 6th International Conference on Wireless Communications and Applications (ICWCAPP). IEEE, 2022. http://dx.doi.org/10.1109/icwcapp57292.2022.00043.
Full textZarnett, Jeff, Mahesh Tripunitara, and Patrick Lam. "Role-based access control (RBAC) in Java via proxy objects using annotations." In Proceeding of the 15th ACM symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1809842.1809858.
Full textSong, Mingqiu, and Zhiguo Pang. "SA-RBAC: An Innovative Role-Based Access Control Model Introducing Self-Authentication Mechanism." In 2008 3rd International Conference on Innovative Computing Information and Control. IEEE, 2008. http://dx.doi.org/10.1109/icicic.2008.484.
Full textSodiya, Adesina, and Adebukola Onashoga. "Components- Based Access Control Architecture." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3374.
Full textReports on the topic "Role based access control (RBAC)"
Klasky, Hilda B., Sashi Tadinada, Paul T. Williams, and Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), September 2013. http://dx.doi.org/10.2172/1093096.
Full textJansen, W. A. A revised model for role-based access control. Gaithersburg, MD: National Institute of Standards and Technology, 1998. http://dx.doi.org/10.6028/nist.ir.6192.
Full textFreudenthal, Eric, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti. DRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada440599.
Full textShah, Arpan P. Scalable Authorization in Role-Based Access Control Using Negative Permissions and Remote Authorization. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada460113.
Full textPoole, Joseph, John Barkley, Kevin Brady, Anthony Cincotta, and Wayne Salamon. Distributed communication methods and role-based access control for use in health care applications. Gaithersburg, MD: National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.ir.5820.
Full text