Gotowa bibliografia na temat „RBAC”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „RBAC”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "RBAC"

1

Mitra, Barsha, Shamik Sural, Jaideep Vaidya i Vijayalakshmi Atluri. "Migrating from RBAC to temporal RBAC". IET Information Security 11, nr 5 (1.09.2017): 294–300. http://dx.doi.org/10.1049/iet-ifs.2016.0258.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Liu, Gang, Runnan Zhang, Huimin Song, Can Wang, Jinhui Liu i Aijun Liu. "Ts-RBAC: A RBAC model with transformation". Computers & Security 60 (lipiec 2016): 52–61. http://dx.doi.org/10.1016/j.cose.2016.03.006.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Damiani, Maria Luisa, Elisa Bertino, Barbara Catania i Paolo Perlasca. "GEO-RBAC". ACM Transactions on Information and System Security 10, nr 1 (luty 2007): 2. http://dx.doi.org/10.1145/1210263.1210265.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Rao, K. Rajesh, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan i Muttukrishnan Rajarajan. "Role recommender-RBAC: Optimizing user-role assignments in RBAC". Computer Communications 166 (styczeń 2021): 140–53. http://dx.doi.org/10.1016/j.comcom.2020.12.006.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Bonatti, Piero, Clemente Galdi i Davide Torres. "Event-driven RBAC". Journal of Computer Security 23, nr 6 (2.12.2015): 709–57. http://dx.doi.org/10.3233/jcs-150539.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Joshi, Jyoti. "Improved & Extended-RBAC (Jv-RBAC) Model with X.509 Authentication". Computer Science & Engineering: An International Journal 2, nr 3 (30.06.2012): 57–66. http://dx.doi.org/10.5121/cseij.2012.2305.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Shuriya. B, Shuriya B., i Dr S. Sumathi Dr. S. Sumathi. "Study of an RBAC System". Indian Journal of Applied Research 3, nr 3 (1.10.2011): 104–6. http://dx.doi.org/10.15373/2249555x/mar2013/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Wang, Zhen Wu. "A Flexible Role Based Access Control Engine Model". Advanced Materials Research 403-408 (listopad 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.

Pełny tekst źródła
Streszczenie:
The normal role-based access control (RBAC) model decouples users and permissions through roles,and different software systems have different implementation syteles.The paper proposes an engine model which can configure the RBAC management systems flexibly.It is a configuration tool to generate different RBAC management systems which meet different users’ requirements. The practice proves that the engine model can improve the efficiency and quality of software development. The role-based access control model decouples users and permissions through roles in order to simplify authorized operations and safety management[1]. Many literatures[2-6] discuss the RBAC model from different aspects. Some literatures[2-3] add new elements to the normal RBAC model,and these models are unidimensional according to the manipulated resources.For example, the NIST RBAC reference model [2] extends and standardize the RBAC96 [1] model reasonably.Some literatures[4-5] introduce time property to RBAC model and they are two-dimensional models according to the manipulated resources.Literature[6] furtherly add visual data muster to RBAC model and proposes a three-dimensional access control model. All of these models only discuss access control model theoretically,and different role-based access control modules in software systems have different instantiation sytles.For example, a RBAC module in one software system can not meet the access control requirements in another system because different RBAC modules have different table fields in order to realize certain requirements. This paper proposes a flexible role-based access control engine which can configure the RBAC module for different systmes according to each customer’s requirement.The engine is a configuration tool and it can realize various RBAC modules which have different table fields in database.The paper is organized as follows.Section I introduces the basic concepts of the NIST RBAC model;Seciton II details the description of RBAC engine model and gives the configuration steps using this engine to generate RBAC instances,and at last section III gives an example and concludes the paper.
Style APA, Harvard, Vancouver, ISO itp.
9

Kim, In-Tae, Kyung-Yong Chung, Kee-Wook Rim i Jung-Hyun Lee. "Dynamic RBAC Model based on OSGi". Journal of the Korea Contents Association 9, nr 1 (28.01.2009): 53–60. http://dx.doi.org/10.5392/jkca.2009.9.1.053.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Editorial Office, OBM Integrative and Complementary Medicine. "An Interview with Dr. Sok Cheon Pak". OBM Integrative and Complementary Medicine 07, nr 03 (20.09.2022): 1–4. http://dx.doi.org/10.21926/obm.icm.2203043.

Pełny tekst źródła
Streszczenie:
Interview with Dr. Sok Cheon Pak.<strong> </strong>Dr Pak as a physiologist currently leads and guides research into nutraceuticals to provide relevant and impactful clinical applications. The best example is the rice bran arabinoxylan compound (RBAC). RBAC is a functional food produced from hydrolysed rice bran denatured with shiitake mushroom enzymes. RBAC demonstrates strong immunomodulatory properties, particularly for enhancing the natural killer cell activity. Additionally, RBAC is a potent antiproliferative food supplement with strong evidence showing that it can arrest tumour proliferation. Dr Pak has recently published a book on RBAC.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "RBAC"

1

Guo, Yuxia. "User/group administration for RBAC". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0001/MQ42067.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Khambhammettu, Hemanth. "Enforcing complex policies in RBAC". Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529765.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Buccelli, Emanuele. "Ingegnerizzazione di RBAC-MAS in TuCSoN". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8462/.

Pełny tekst źródła
Streszczenie:
L'obiettivo della tesi è la creazione di un'infrastruttura di tipo RBAC (Role Based Access Control), adibita al controllo degli accessi all'interno del linguaggio di coordinazione TuCSoN. Il punto di partenza si basa sull'analisi del lavoro sviluppato dall'Ing. Galassi: "Modello di sicurezza e controllo di accesso in una infrastruttura di coordinazione: architettura e implementazione". Usando questa come base teorica di partenza, si sono estrapolati i concetti chiave e si è data vita ad un'implementazione funzionante e di semplice utilizzo di RBAC in TuCSoN.
Style APA, Harvard, Vancouver, ISO itp.
4

Darwish, Wesam M. "Analysis of ANSI RBAC support in commercial middleware". Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/7147.

Pełny tekst źródła
Streszczenie:
This thesis analyzes the access control architectures of three middleware technologies: Common Object Request Broker Architecture (CORBA), Enterprise Java Beans (EJB), and Component Object Model (COM+). For all technologies under study, we formalize the protection state of their corresponding authorization architectures in a more precise and less ambiguous language than their respective specifications. We also suggest algorithms that define the semantics of authorization decisions in CORBA, EJB, and COM+. Using the formalized protection state configurations, we analyze the level of support for the American National Standard Institute's (ANSI) specification of Role-Based Access Control (RBAC) components and functional specification in the studied middleware technologies. This thesis establishes a framework for assessing implementations of ANSI RBAC in the analyzed middleware technologies. Our findings indicate that all of three middleware technologies under study fall short of supporting even Core ANSI RBAC. Custom extensions are necessary in order for implementations compliant with each middleware to support ANSI RBAC required or optional components. Some of the limitations preventing support of ANSI RBAC are due to the middleware's architectural design decisions; however, fundamental limitations exist due to the impracticality of some aspects of the ANSI RBAC standard itself.
Style APA, Harvard, Vancouver, ISO itp.
5

Ma, Mingchao. "Distributed RBAC for subscription-based remote network services". Thesis, University of Greenwich, 2007. http://gala.gre.ac.uk/6232/.

Pełny tekst źródła
Streszczenie:
The problems of identity management inherent in distributed subscription-based resource sharing are investigated in this thesis. The thesis introduces a concept of authentication delegation and distributed RBAC (DRBAC) to support fine granular access control across multiple autonomous resource sites and subscribing sites. The DRBAC model extends the RBAC model to a distributed environment. A prototype system based on the concepts of authentication delegation and distributed role and the distributed RBAC model has been implemented and tested. Access is allowed based on the distributed roles, subject to certain constraints. Enforcing distributed role based access control policies allows organizations to ease the administrative overhead in a distributed environment. This thesis concentrates on both theoretical and practical aspects. It describes the design, implementation and performance of a prototype system that provides controlled access to subscription-based remote network services through a web browser. The prototype system is developed using Java technology and runs on a Tomcat web server. A third-party authentication protocol is designed and employed to exchange security assertions among involved parties. An XML-based policy language has been employed in the system for authorization decision. Public key cryptography and XML security technology are used to ensure the confidentiality and integrity of the system and interaction among the involved parties. The web servers use plug-ins to provide an authentication-delegation service and a policy-based authorization service. Users can use a single userID and password to access multiple subscribed resource sites.
Style APA, Harvard, Vancouver, ISO itp.
6

Regateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications". Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.

Pełny tekst źródła
Streszczenie:
Mestrado em Engenharia de Computadores e Telemática
Nowadays, database application use tools like Java Database Connectivity, Hibernate or ADO.NET to access data stored in databases. These tools are designed to bring together the relational database and object-oriented programming paradigms, forsaking applied access control policies. Hence, the application developers must master the established policies as a means to develop software that is conformant with the established access control policies. Furthermore, there are situations where these policies can evolve dynamically. In these cases it becomes hard to adjust the access control mechanisms. This challenge has led to the development of an extension to the role based access control (RBAC) model where permissions are defined as a sequence of create, read, update and delete (CRUD) expressions that can be executed and the interfaces to access them. From these permissions it's possible to generate security artefacts on the client side, i.e. in a distributed manner, which allows the clients to access the stored data while satisfying the security policies defined. On top of this model extension, a security layer has also been created in order to make the access control secure and obligatory. For the RBAC model extension this work leverages a previous work that created a dynamic access control architecture for relational applications, here referred to as DACA (Dynamic Access Control Architecture). DACA uses business logic information and the defined access control policies to build dynamically the security artefacts for the applications. In situations where the access control policies can evolve dynamically, the security artefacts are adjusted automatically. This base work, however, defines as permissions CRUD expressions, which can be executed in any order, and needs an adequate security layer to authenticate users and protect the system form intruders. Hence, this work aims to create a new architecture, called “S-DRACA” (Secure, Dynamic and Distributed Role-based Access Control Architecture), which extends the work done with DACA so that it is capable of enforcing sequences of CRUD expressions that the applications can execute if the sequences are associated with their roles and the development of a security layer to make it secure. We discuss as well the performance of this system and its applicability to other environments outside of relational databases.
Atualmente, aplicações que acedem a bases de dados utilizam ferramentas como o Java Database Connectivity, Hibernate ou ADO.NET para aceder aos dados nelas armazenados. Estas ferramentas estão desenhadas para unir os paradigmas das bases de dados relacionais e da programação orientada a objetos, mas não estão preocupados com as políticas de controlo de acesso a aplicar. Portanto, os programadores de aplicações têm de dominar as políticas estabelecidas a fim de desenvolver aplicações em conformidade com as políticas de controlo de acesso estabelecidas.. Além disso, existem situações em que as políticas de controlo de acesso podem evoluir dinamicamente. Nestes casos, torna-se difícil adequar os mecanismos de controlo de acesso. Este desafio motivou o desenvolvimento de uma extensão ao modelo de controlo de acesso baseado em papeis (RBAC) que define como permissões sequências de expressões para criar, ler, atualizar e apagar (CRUD) informação e as interfaces de acesso a cada uma delas. A partir destas permissões podem ser gerados artefactos de segurança do lado dos clientes, i.e. de uma forma distribuída, que lhes permitem aceder à informação armazenada na base de dados segundo as políticas definidas. Por cima desta extenção também foi criada uma camada de segurança para tornar o controlo de acesso seguro e obrigatório. Para a extensão do modelo RBAC este trabalho baseou-se num trabalho anterior que criou uma arquitectura dinâmica de controlo de acesso para aplicações de bases de dados relacionais, aqui referida como DACA (Dynamic Access Control Architecture). DACA utiliza informação da lógica de negócio e as políticas de controlo de acesso que foram definidos para criar dinamicamente os artefactos de segurança para as aplicações. Em situações onde as políticas de controle de acesso evoluem de forma dinâmica, os artefactos de segurança são ajustados automaticamente. Este trabalho base, no entanto, define como permissões as expressões CRUD, podendo estas ser executadas em qualquer ordem, e necessita de uma camada de segurança adequada para autenticar utilizadores e proteger os dados sensíveis de intrusos. Portanto, neste trabalho, pretende-se criar uma nova arquitectura, chamada “S-DRACA” (Secure, Dynamic and Distributed Role-based Access Control Architecture), que estende o trabalho feito no âmbito do DACA para que este seja capaz de garantir que sejam cumpridas sequência de expressões CRUD que as aplicações podem executar e que estão associados aos seus papéis nas políticas RBAC e desenvolver uma camada de segurança adequada para a tornar segura. Discutimos, também, o seu desempenho e aplicabilidade em outros ambientes sem ser em bases de dados relacionais.
Style APA, Harvard, Vancouver, ISO itp.
7

Costa, Vanderlei Ferreira da. "Autorização integrada entre portais e Globus baseada no modelo RBAC". Universidade Católica de Santos, 2008. http://biblioteca.unisantos.br:8181/handle/tede/603.

Pełny tekst źródła
Streszczenie:
Made available in DSpace on 2015-02-04T21:45:26Z (GMT). No. of bitstreams: 1 Vanderlei Costa.pdf: 1535805 bytes, checksum: 1edf57ffedf62a0db7a4c94312b486d6 (MD5) Previous issue date: 2008-10-03
Plataformas de grade computacional têm sido adotadas para promover o compartilhamento, agregação e coordenação de grandes quantidades de recursos geograficamente distribuídos e multi-institucionais. Em tais ambientes, que envolvem grandes quantidades de recursos localizados em diversos domínios administrativos e sujeitos a uma diversidade de políticas de controle de acesso, o controle de acesso é obrigatório. Como principal contribuição, o presente trabalho estende o arcabouço (framework) de portais GridSphere com o objetivo de fornecer ferramentas de controle de acesso que podem ser utilizadas para o desenvolvimento de aplicaçõess para grades computacionais. Os mecanismos e ferramentas propostos também realizam o controle de acesso no nível de invocação de serviço, que pode ser usado por qualquer aplicação compatível com OGSA que realize invocações a serviços de grade. Nossa abordagem permite a integração e consistência entre políticas de autorização aplicadas no lado do portal e no lado do provedor de serviço.
Style APA, Harvard, Vancouver, ISO itp.
8

Damasceno, Carlos Diego Nascimento. "Evaluating finite state machine based testing methods on RBAC systems". Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-11112016-101158/.

Pełny tekst źródła
Streszczenie:
Access Control (AC) is a major pillar in software security. In short, AC ensures that only intended users can access resources and only the required access to accomplish some task will be given. In this context, Role Based Access Control (RBAC) has been established as one of the most important paradigms of access control. In an organization, users receive responsibilities and privileges through roles and, in AC systems implementing RBAC, permissions are granted through roles assigned to users. Despite the apparent simplicity, mistakes can occur during the development of RBAC systems and lead to faults or either security breaches. Therefore, a careful verification and validation process becomes necessary. Access control testing aims at showing divergences between the actual and the intended behavior of access control mechanisms. Model Based Testing (MBT) is a variant of testing that relies on explicit models, such as Finite State Machines (FSM), for automatizing test generation. MBT has been successfully used for testing functional requirements; however, there is still lacking investigations on testing non-functional requirements, such as access control, specially in test criteria. In this Master Dissertation, two aspects of MBT of RBAC were investigated: FSM-based testing methods on RBAC; and Test prioritization in the domain of RBAC. At first, one recent (SPY) and two traditional (W and HSI) FSM-based testing methods were compared on RBAC policies specified as FSM models. The characteristics (number of resets, average test case length and test suite length) and the effectiveness of test suites generated from the W, HSI and SPY methods to five different RBAC policies were analyzed at an experiment. Later, three test prioritization methods were compared using the test suites generated in the previous investigation. A prioritization criteria based on RBAC similarity was introduced and compared to random prioritization and simple similarity. The obtained results pointed out that the SPY method outperformed W and HSI methods on RBAC domain. The RBAC similarity also achieved an Average Percentage Faults Detected (APFD) higher than the other approaches.
Controle de Acesso (CA) é um dos principais pilares da segurança da informação. Em resumo, CA permite assegurar que somente usuários habilitados terão acesso aos recursos de um sistema, e somente o acesso necessário para a realização de uma dada tarefa será disponibilizado. Neste contexto, o controle de acesso baseado em papel (do inglês, Role Based Access Control - RBAC) tem se estabelecido como um dos mais importante paradigmas de controle de acesso. Em uma organização, usuários recebem responsabilidades por meio de cargos e papéis que eles exercem e, em sistemas RBAC, permissões são distribuídas por meio de papéis atribuídos aos usuários. Apesar da aparente simplicidade, enganos podem ocorrer no desenvolvimento de sistemas RBAC e gerar falhas ou até mesmo brechas de segurança. Dessa forma, processos de verificação e validação tornam-se necessários. Teste de CA visa identificar divergências entre a especificação e o comportamento apresentado por um mecanismo de CA. Teste Baseado em Modelos (TBM) é uma variante de teste de software que se baseia em modelos explícitos de especificação para automatizar a geração de casos testes. TBM tem sido aplicado com sucesso no teste funcional, entretanto, ainda existem lacunas de pesquisa no TBM de requisitos não funcionais, tais como controle de acesso, especialmente de critérios de teste. Nesta dissertação de mestrado, dois aspectos do TBM de RBAC são investigados: métodos de geração de teste baseados em Máquinas de Estados Finitos (MEF) para RBAC; e priorização de testes para RBAC. Inicialmente, dois métodos tradicionais de geração de teste, W e HSI, foram comparados ao método de teste mais recente, SPY, em um experimento usando políticas RBAC especificadas como MEFs. As características (número de resets, comprimento médio dos casos de teste e comprimento do conjunto de teste) e a efetividade dos conjuntos de teste gerados por cada método para cinco políticas RBAC foram analisadas. Posteriormente, três métodos de priorização de testes foram comparados usando os conjuntos de teste gerados no experimento anterior. Neste caso, um critério baseado em similaridade RBAC foi proposto e comparado com a priorização aleatória e baseada em similaridade simples. Os resultados obtidos mostraram que o método SPY conseguiu superar os métodos W e HSI no teste de sistemas RBAC. A similaridade RBAC também alcançou uma detecção de defeitos superior.
Style APA, Harvard, Vancouver, ISO itp.
9

Goran, Sladić. "Model kontekstno zavisne kontrole pristupa u poslovnim sistemima". Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2011. http://dx.doi.org/10.2298/NS2011SLADICGORAN.

Pełny tekst źródła
Streszczenie:
Kontrola pristupa odnosno autorizacija, u širem smislu, razmatra na koji način korisnici mogu pristupiti resursima računarskog sistema i na koji način ih koristiti. Ova disertacija se bavi problemima kontrole pristupa u poslovnim sistemima. Tema disertacije je formalna specifkacija modela kontekstno zavisne kontrole pristupa u poslovnim sistemima koji je baziran na RBAC modelu kontrole pristupa. Uvođenjem kontekstno zavisne kontrole pristupa omogućeno je defnisanje složenijih prava pristupa koje u postojećim modelima kontrole pristupa za poslovne sisteme nije bilo moguće realizovati ili bi njihova realizacija bila komplikovana. Dati model primenljiv je u različitim poslovnim sistemima, a podržava defnisanje prava pristupa kako za jednostavne tako i za slo·zene poslovne tokove. Sistem je verifkovan na dva realna poslovna procesa pomoću razvijenog prototipa. Prikazana prototipska implementacija koja ispunjava ciljeve u pogledu funkcionalnosti postavljene pred sistem predstavlja potvrdu praktične vrednosti predloženog modela.
Access control is concerned with the way in which users can access to resources in the computer system. This dissertation focuses on problems of access control for business processes. The subject of the dissertation is a formal specification of the RBAC-based context sensitive access control model for business processes. By using a context-sensitive access control it is possible to define more complex access control policies whose implementation in existing access control models for business processes is not possible or is very complicated. The given model is applicable in diferent business systems, and supports the definition of access control policies for both simple and complex business processes. The model's prototype is verified by two case studies on real business processes. The presented prototype implementation represents a proof of the proposed model's practical value.
Style APA, Harvard, Vancouver, ISO itp.
10

Khayat, Etienne J. "Role-based access control (RBAC) : formal modelling and risk-based administration". Thesis, London South Bank University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435233.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "RBAC"

1

Fischer-Hellmann, Klaus-Peter. Information Flow Based Security Control Beyond RBAC. Redaktor Rainer Bischoff. Wiesbaden: Springer Fachmedien Wiesbaden, 2012. http://dx.doi.org/10.1007/978-3-8348-2618-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Filho, Oscar Gomes. RBAC, Rio Branco Atlético Clube: História e conquistas, 1913-1987. Vitória, ES: [s.n.], 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

assot͡siat͡sii͡a, Rossiĭskai͡a bibliotechnai͡a. RBA. Sankt Peterburg: Rossiĭskai͡a bibliotechnai͡a assot͡siat͡sii͡a, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Meroni, Germana, red. TRIM/RBCC Proteins. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5398-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Meroni, Germana. TRIM/RBCC proteins. New York, N.Y: Springer Science+Business Media, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Yid mtshoʼi rba rlabs. [Lha-sa]: Bod-ljoṅs mi dmaṅs dpe skrun Khaṅ, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

"Rba bźed" phyogs bsgrigs. [Pe-cin]: Mi rigs dpe skrun khaṅ, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Katcharian, Hope. Risk-Based Corrective Action (RBCA) at petroleum contaminated sites: The rationale for RBCA and natural attenuation. Springfield, Va: Available from National Technical Information Service, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Woodcock, Gordon R. HRST, rocket/RBCC options: A comparative study. [Washington, DC: National Aeronautics and Space Administration, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Brtse duṅ gi rba rlabs. [Lanzhou]: Kan-suʼu mi rigs dpe skrun khaṅ, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "RBAC"

1

Wang, Lunwei, Lifeng Wei, Xiangke Liao i Huaimin Wang. "AT-RBAC: An Authentication Trustworthiness-Based RBAC Model". W Grid and Cooperative Computing - GCC 2004 Workshops, 343–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30207-0_43.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Molesini, Ambra, Enrico Denti i Andrea Omicini. "RBAC-MAS and SODA: Experimenting RBAC in AOSE". W Engineering Societies in the Agents World IX, 69–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02562-4_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Oleshchuk, Vladimir. "Trust-Aware RBAC". W Lecture Notes in Computer Science, 97–107. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Zhang, Yue, i James B. D. Joshi. "GEO-RBAC Model". W Encyclopedia of Database Systems, 1–2. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_1509-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Barker, Steve, Paul Douglas i Terry Fanning. "Implementing RBAC Policies". W Research Directions in Data and Applications Security, 27–36. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35697-6_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Zhang, Yue, i James B. D. Joshi. "GEO-RBAC Model". W Encyclopedia of Database Systems, 1244–45. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1509.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Zhang, Yue, i James B. D. Joshi. "GEO-RBAC Model". W Encyclopedia of Database Systems, 1614–16. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1509.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Chandran, Suroop Mohan, i J. B. D. Joshi. "LoT-RBAC: A Location and Time-Based RBAC Model". W Lecture Notes in Computer Science, 361–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11581062_27.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ding, Yi, Jun Jin, Jinglun Zhang, Zhongyi Wu i Kai Hu. "SC-RBAC: A Smart Contract based RBAC Model for DApps". W Human Centered Computing, 75–85. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37429-7_8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Bijon, Khalid Zaman, Ram Krishnan i Ravi Sandhu. "Risk-Aware RBAC Sessions". W Information Systems Security, 59–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35130-3_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "RBAC"

1

Kirkpatrick, Michael S., Maria Luisa Damiani i Elisa Bertino. "Prox-RBAC". W the 19th ACM SIGSPATIAL International Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2093973.2094018.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Bertino, Elisa, Barbara Catania, Maria Luisa Damiani i Paolo Perlasca. "GEO-RBAC". W the tenth ACM symposium. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1063979.1063985.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Youman, Charles E. "RBAC transition". W the first ACM Workshop. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/270152.270160.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kiviharju, Mikko. "RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies". W International Conference on Security and Cryptography. SCITEPRESS - Science and and Technology Publications, 2014. http://dx.doi.org/10.5220/0005122105000509.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Ferrara, Anna Lisa, Georg Fuchsbauer i Bogdan Warinschi. "Cryptographically Enforced RBAC". W 2013 IEEE 26th Computer Security Foundations Symposium (CSF). IEEE, 2013. http://dx.doi.org/10.1109/csf.2013.15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Coyne, Edward J. "Prioritizing RBAC features". W the first ACM Workshop. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/270152.270156.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Sandhu, Ravi. "Issues in RBAC". W the first ACM Workshop. New York, New York, USA: ACM Press, 1996. http://dx.doi.org/10.1145/270152.270162.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Ouyang, Kai, i James B. D. Joshi. "CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time". W 2007 IEEE International Performance, Computing, and Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/pccc.2007.358928.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ferreira, Ana, David Chadwick, Pedro Farinha, Ricardo Correia, Gansen Zao, Rui Chilro i Luis Antunes. "How to Securely Break into RBAC: The BTG-RBAC Model". W 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Bouchahda, Ahlem, Nhan Le Thanh, Adel Bouhoula i Faten Labbene. "RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases". W 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.30.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "RBAC"

1

Hull, Julie, i Mark Markham. RBAC Driven Least Privilege Architecture For Control Systems. Office of Scientific and Technical Information (OSTI), styczeń 2014. http://dx.doi.org/10.2172/1124080.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Klasky, Hilda B., Sashi Tadinada, Paul T. Williams i Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), wrzesień 2013. http://dx.doi.org/10.2172/1093096.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Winters, Paul, Benjamin Wakefield, Irene Toma, Anneke Schmider, Frini Chantzi i Osman Dar. Facilitating progress towards SDG2: Zero Hunger. Royal Institute of International Affairs, luty 2022. http://dx.doi.org/10.55317/9781784135072.

Pełny tekst źródła
Streszczenie:
Sustainable Development Goal 2: Zero Hunger (SDG2) remains out of reach. SDG2 progress has slowed over the last few years, and the impact of the COVID-19 pandemic is expected to exacerbate the problem. Improving the leadership, governance and coordination of the three UN Rome-based agencies (RBAs) – the Food and Agriculture Organization (FAO), the International Fund for Agricultural Development (IFAD) and the World Food Programme (WFP) – is crucial to achieving this objective. Lessons from comparable institutions, such as the International Monetary Fund, the World Bank Group and the World Health Organization may prove vital in realizing SDG2. While there are many actors that will influence progress towards this goal, the RBAs are best placed to lead on this initiative through improved transparency and leadership selection processes; the consolidation of RBA meetings and higher-level dialogue at those events; and enhanced collaboration at the regional, country and global levels.
Style APA, Harvard, Vancouver, ISO itp.
4

Samios N. P. RBRC Scientific Review Committee Meeting, Volume 101. Office of Scientific and Technical Information (OSTI), styczeń 2011. http://dx.doi.org/10.2172/1093764.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Samios, N. P. RBRC Scientific Review Committee Meeting, Volume 97. Office of Scientific and Technical Information (OSTI), listopad 2009. http://dx.doi.org/10.2172/972031.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

ORGANIZERS: OZAKI, S., i N. P. SAMIOS. PROCEEDINGS OF RIKEN BNL RESEARCH CENTER WORKSHOP: RBRC QCDOC COMPUTER DEDICATION AND SYMPOSIUM ON RBRC QCDOC (VOLUME 74). Office of Scientific and Technical Information (OSTI), lipiec 2005. http://dx.doi.org/10.2172/15020005.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

En'yo, Hideto, i Taku Izubuchi. RIKEN/RBRC Scientific Review Committee Meeting (Vol. 132). Office of Scientific and Technical Information (OSTI), maj 2019. http://dx.doi.org/10.2172/1524567.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Baltz A. RIKEN/RBRC Workshop: future Directions in High Energy QCD. Office of Scientific and Technical Information (OSTI), październik 2011. http://dx.doi.org/10.2172/1044786.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Coury, Tarek, i Yi Wen. Global Indeterminacy in Locally Determinate RBC Models. Federal Reserve Bank of St. Louis, 2007. http://dx.doi.org/10.20955/wp.2007.029.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Prescott, Edward. RBC Methodology and the Development of Aggregate Economic Theory. Cambridge, MA: National Bureau of Economic Research, lipiec 2016. http://dx.doi.org/10.3386/w22422.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii