Journal articles on the topic 'Role based access control (RBAC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Role based access control (RBAC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.
Full textAftab, Muhammad Umar, Zhiguang Qin, Negalign Wake Hundera, Oluwasanmi Ariyo, Zakria, Ngo Tung Son, and Tran Van Dinh. "Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model." Symmetry 11, no. 5 (May 15, 2019): 669. http://dx.doi.org/10.3390/sym11050669.
Full textRashid, Mamoon, and Er Rishma Chawla. "Securing Data Storage By Extending Role-Based Access Control." International Journal of Cloud Applications and Computing 3, no. 4 (October 2013): 28–37. http://dx.doi.org/10.4018/ijcac.2013100103.
Full textGao, Lei, and Shu Lin Pan. "Fine-Grained Access Control Model Based on RBAC." Advanced Materials Research 468-471 (February 2012): 1667–70. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1667.
Full textNyame, Gabriel, and Zhiguang Qin. "Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework." Information 11, no. 6 (June 22, 2020): 334. http://dx.doi.org/10.3390/info11060334.
Full textHuang, Dan Hua, and Ya Qian Yang. "Role-Based Risk Adaptive Access Control Model." Applied Mechanics and Materials 416-417 (September 2013): 1516–21. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1516.
Full textZhao, Yu Lan, and Chun Feng Jiang. "Research of Access Control Models in Personal Networks." Advanced Materials Research 989-994 (July 2014): 4751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4751.
Full textde Carvalho Junior, Marcelo Antonio, and Paulo Bandiera-Paiva. "Health Information System Role-Based Access Control Current Security Trends and Challenges." Journal of Healthcare Engineering 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/6510249.
Full textAbbdelkrim, Bouadjemi. "FORMAL DECISION MODELING FOR ROLE-BASED ACCESS CONTROL POLICIES." Advances in Mathematics: Scientific Journal 12, no. 3 (March 18, 2023): 465–77. http://dx.doi.org/10.37418/amsj.12.3.4.
Full textMundbrod, Nicolas, and Manfred Reichert. "Object-Specific Role-Based Access Control." International Journal of Cooperative Information Systems 28, no. 01 (March 2019): 1950003. http://dx.doi.org/10.1142/s0218843019500035.
Full textWang, Tao, and Qiang Wu. "Role Minimization Optimization Algorithm Based on Concept Lattice Factor." Mathematics 11, no. 14 (July 10, 2023): 3047. http://dx.doi.org/10.3390/math11143047.
Full textZhao, Jiang Min, Jian Kang, and Tian Ge Li. "A Flexible Workflow Model of Role Based Access Control." Applied Mechanics and Materials 733 (February 2015): 784–87. http://dx.doi.org/10.4028/www.scientific.net/amm.733.784.
Full textMeneka, M., and K. Meenakshisundaram. "An Enhancement Role and Attribute Based Access Control Mechanism in Big Data." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 3187. http://dx.doi.org/10.11591/ijece.v8i5.pp3187-3193.
Full textKUHLMANN, MIRCO, KARSTEN SOHR, and MARTIN GOGOLLA. "Employing UML and OCL for designing and analysing role-based access control." Mathematical Structures in Computer Science 23, no. 4 (July 8, 2013): 796–833. http://dx.doi.org/10.1017/s0960129512000266.
Full textTsegaye, Tamir, and Stephen Flowerday. "A Clark-Wilson and ANSI role-based access control model." Information & Computer Security 28, no. 3 (June 14, 2020): 373–95. http://dx.doi.org/10.1108/ics-08-2019-0100.
Full textCHAE, S. h. "uT-RBAC: Ubiquitous Role-Based Access Control Model." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 1 (January 1, 2006): 238–39. http://dx.doi.org/10.1093/ietfec/e89-a.1.238.
Full textDia, Ousmane Amadou, and Csilla Farkas. "Business Driven User Role Assignment." International Journal of Information Security and Privacy 7, no. 1 (January 2013): 45–62. http://dx.doi.org/10.4018/jisp.2013010104.
Full textSabri, Khair Eddin. "An Algebraic Model to Analyze Role-Based Access Control Policies." Modern Applied Science 12, no. 10 (September 12, 2018): 50. http://dx.doi.org/10.5539/mas.v12n10p50.
Full textLi, Yunliang, Zhiqiang Du, Yanfang Fu, and Liangxin Liu. "Role-Based Access Control Model for Inter-System Cross-Domain in Multi-Domain Environment." Applied Sciences 12, no. 24 (December 19, 2022): 13036. http://dx.doi.org/10.3390/app122413036.
Full textPenelova, Maria. "Hybrid Role and Attribute Based Access Control Applied in Information Systems." Cybernetics and Information Technologies 21, no. 3 (September 1, 2021): 85–96. http://dx.doi.org/10.2478/cait-2021-0031.
Full textMowla, Saleh, Niharika Sinha, Raghavendra Ganiga, and Nisha P. Shetty. "Trust Enhanced Role Based Access Control Using Genetic Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 4724. http://dx.doi.org/10.11591/ijece.v8i6.pp4724-4734.
Full textDeng, Ji Qiu, Xiao Qing Luo, and Huang Ling Gu. "The Design and Implementation of G-RBAC Model in Map Permission." Advanced Materials Research 268-270 (July 2011): 1457–61. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1457.
Full textGhazal, Rubina, Ahmad Malik, Basit Raza, Nauman Qadeer, Nafees Qamar, and Sajal Bhatia. "Agent-Based Semantic Role Mining for Intelligent Access Control in Multi-Domain Collaborative Applications of Smart Cities." Sensors 21, no. 13 (June 22, 2021): 4253. http://dx.doi.org/10.3390/s21134253.
Full textCruz, Jason Paul, Yuichi Kaji, and Naoto Yanai. "RBAC-SC: Role-Based Access Control Using Smart Contract." IEEE Access 6 (2018): 12240–51. http://dx.doi.org/10.1109/access.2018.2812844.
Full textFragkos, Georgios, Jay Johnson, and Eirini Eleni Tsiropoulou. "Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations." Energies 15, no. 17 (September 1, 2022): 6375. http://dx.doi.org/10.3390/en15176375.
Full textPatil, Suraj Krishna, Sandipkumar Chandrakant Sagare, and Alankar Shantaram Shelar. "Use of Purpose and Role Based Access Control Mechanisms to Protect Data Within RDBMS." International Journal of Software Innovation 8, no. 1 (January 2020): 82–91. http://dx.doi.org/10.4018/ijsi.2020010105.
Full textArora, Amar, and Anjana Gosain. "Dynamic Trust Emergency Role-based Access Control (DTE-RBAC)." International Journal of Computer Applications 175, no. 24 (October 15, 2020): 20–24. http://dx.doi.org/10.5120/ijca2020920773.
Full textHan, Gui Ying, and Xi Zuo Li. "The Implementation of Rights Management of Network Teaching Platform with Role-Based Access Control." Applied Mechanics and Materials 433-435 (October 2013): 1603–8. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1603.
Full textYastrebov, Ilia. "Role-Based Access Control for the Large Hadron Collider at CERN." International Journal of Computers Communications & Control 5, no. 3 (September 1, 2010): 398. http://dx.doi.org/10.15837/ijccc.2010.3.2491.
Full textChen, Ling. "Research on Role Access Control Model Based on Identity Authentication." Journal of Physics: Conference Series 2025, no. 1 (September 1, 2021): 012105. http://dx.doi.org/10.1088/1742-6596/2025/1/012105.
Full textSinha, Geetanjali, Prabhu Shankar K.C, and Shaurya Jain. "Evolution of access control models for protection of patient details: a survey." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 554. http://dx.doi.org/10.14419/ijet.v7i2.8.10520.
Full textQin, Sheng Jun, and Ken E. Li. "The Research of Group Hierarchy Access Control in E-Government System." Advanced Materials Research 834-836 (October 2013): 1840–43. http://dx.doi.org/10.4028/www.scientific.net/amr.834-836.1840.
Full textLee, Woomyo, Gunhee Lee, Sinkyu Kim, and Jungtaek Seo. "SG-RBAC : Role Based Access Control Model for Smart Grid Environment." Journal of the Korea Institute of Information Security and Cryptology 23, no. 2 (April 30, 2013): 307–18. http://dx.doi.org/10.13089/jkiisc.2013.23.2.307.
Full textNyame, Gabriel, Zhiguang Qin, Kwame Opuni-Boachie Obour Agyekum, and Emmanuel Boateng Sifah. "An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain." Information 11, no. 2 (February 17, 2020): 111. http://dx.doi.org/10.3390/info11020111.
Full textYarmak, A. "Post-Quantum Cryptographic Access Control Based on Hierarchical RBAC Model." Proceedings of Telecommunication Universities 8, no. 4 (January 10, 2023): 119–29. http://dx.doi.org/10.31854/1813-324x-2022-8-4-119-129.
Full textFan, Long, He Huang, and Wei Kang. "Design and Implementation of Role and Group Based Access Control with Context in Document Access Control System." Applied Mechanics and Materials 427-429 (September 2013): 2795–99. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2795.
Full textYang, Jiyong, Xiajiong Shen, Wan Chen, Qiang Ge, Lei Zhang, and HaoLin Chen. "A Model Study on Collaborative Learning and Exploration of RBAC Roles." Wireless Communications and Mobile Computing 2021 (June 24, 2021): 1–9. http://dx.doi.org/10.1155/2021/5549109.
Full textAlattab, Ahmed Abdu, Reyazur Rashid Irshad, Anwar Ali Yahya, and Amin A. Al-Awady. "Privacy Protected Preservation of Electric Vehicles’ Data in Cloud Computing Using Secure Data Access Control." Energies 15, no. 21 (October 31, 2022): 8085. http://dx.doi.org/10.3390/en15218085.
Full textZhang, Jian Hua, and Qiang Liu. "An Administration Iteration Problem and its Solution when Deploying the RBAC Model." Applied Mechanics and Materials 263-266 (December 2012): 1584–87. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1584.
Full textLee, Bong-Hwan, and Hyun-Sug Cho. "Role-based User Access Control with Working Status for u-Healthcare System." KIPS Transactions:PartC 17C, no. 2 (April 30, 2010): 173–80. http://dx.doi.org/10.3745/kipstc.2010.17c.2.173.
Full textNagrale, Vikas, Mayur Yalij, and Ashutosh Kumar. "Data Security of Dynamic and Robust Role Based Access Control from Multiple Authorities in Cloud Environment." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 1307–9. http://dx.doi.org/10.22214/ijraset.2022.42489.
Full textDanilescu, Marcel, and Victor Besliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII, no. 2 (June 2021): 67–78. http://dx.doi.org/10.52326/jes.utm.2021.28(2).05.
Full textDong, Li Jun, Mao Cai Wang, and Xiao Jun Kang. "Mining Least Privilege Roles by Genetic Algorithm." Applied Mechanics and Materials 121-126 (October 2011): 4508–12. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.4508.
Full textHe, Li, and Wen Lei Sun. "A Fine-Grained Access Control Approach for Parts Resource Sharing." Applied Mechanics and Materials 722 (December 2014): 159–63. http://dx.doi.org/10.4028/www.scientific.net/amm.722.159.
Full textSubramanian, Chandra Mouliswaran, and Aswani Kumar Cherukuri. "Fuzzy Role Based Access Control Design using Fuzzy Ontology." International Journal of Information Technology Project Management 10, no. 4 (October 2019): 118–36. http://dx.doi.org/10.4018/ijitpm.2019100105.
Full textAl-hadhrami, Nasser, Benjamin Aziz, and Lotfi ben Othmane. "An Incremental B-Model for RBAC-Controlled Electronic Marking System." International Journal of Secure Software Engineering 7, no. 2 (April 2016): 37–64. http://dx.doi.org/10.4018/ijsse.2016040103.
Full textDoan, Thuong, Steven Demurjian, Laurent Michel, and Solomon Berhe. "Integrating Access Control into UML for Secure Software Modeling and Analysis." International Journal of Secure Software Engineering 1, no. 1 (January 2010): 1–19. http://dx.doi.org/10.4018/jsse.2010102001.
Full textAmeer, Safwa, James Benson, and Ravi Sandhu. "An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach." Information 13, no. 2 (January 25, 2022): 60. http://dx.doi.org/10.3390/info13020060.
Full textOmran, Esraa, Tyrone Grandison, David Nelson, and Albert Bokma. "A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain." International Journal of Information Security and Privacy 7, no. 3 (July 2013): 36–52. http://dx.doi.org/10.4018/jisp.2013070103.
Full textFan, Ya Qin, Ge Zhang, Fei Fei Li, and Xin Zhang. "Design of SSL VPN System Based on RBAC Access." Advanced Materials Research 765-767 (September 2013): 1299–302. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1299.
Full text