Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: RBAC.

Artykuły w czasopismach na temat „RBAC”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „RBAC”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Mitra, Barsha, Shamik Sural, Jaideep Vaidya i Vijayalakshmi Atluri. "Migrating from RBAC to temporal RBAC". IET Information Security 11, nr 5 (1.09.2017): 294–300. http://dx.doi.org/10.1049/iet-ifs.2016.0258.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Liu, Gang, Runnan Zhang, Huimin Song, Can Wang, Jinhui Liu i Aijun Liu. "Ts-RBAC: A RBAC model with transformation". Computers & Security 60 (lipiec 2016): 52–61. http://dx.doi.org/10.1016/j.cose.2016.03.006.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Damiani, Maria Luisa, Elisa Bertino, Barbara Catania i Paolo Perlasca. "GEO-RBAC". ACM Transactions on Information and System Security 10, nr 1 (luty 2007): 2. http://dx.doi.org/10.1145/1210263.1210265.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Rao, K. Rajesh, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan i Muttukrishnan Rajarajan. "Role recommender-RBAC: Optimizing user-role assignments in RBAC". Computer Communications 166 (styczeń 2021): 140–53. http://dx.doi.org/10.1016/j.comcom.2020.12.006.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Bonatti, Piero, Clemente Galdi i Davide Torres. "Event-driven RBAC". Journal of Computer Security 23, nr 6 (2.12.2015): 709–57. http://dx.doi.org/10.3233/jcs-150539.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Joshi, Jyoti. "Improved & Extended-RBAC (Jv-RBAC) Model with X.509 Authentication". Computer Science & Engineering: An International Journal 2, nr 3 (30.06.2012): 57–66. http://dx.doi.org/10.5121/cseij.2012.2305.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Shuriya. B, Shuriya B., i Dr S. Sumathi Dr. S. Sumathi. "Study of an RBAC System". Indian Journal of Applied Research 3, nr 3 (1.10.2011): 104–6. http://dx.doi.org/10.15373/2249555x/mar2013/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Wang, Zhen Wu. "A Flexible Role Based Access Control Engine Model". Advanced Materials Research 403-408 (listopad 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.

Pełny tekst źródła
Streszczenie:
The normal role-based access control (RBAC) model decouples users and permissions through roles,and different software systems have different implementation syteles.The paper proposes an engine model which can configure the RBAC management systems flexibly.It is a configuration tool to generate different RBAC management systems which meet different users’ requirements. The practice proves that the engine model can improve the efficiency and quality of software development. The role-based access control model decouples users and permissions through roles in order to simplify authorized operations and safety management[1]. Many literatures[2-6] discuss the RBAC model from different aspects. Some literatures[2-3] add new elements to the normal RBAC model,and these models are unidimensional according to the manipulated resources.For example, the NIST RBAC reference model [2] extends and standardize the RBAC96 [1] model reasonably.Some literatures[4-5] introduce time property to RBAC model and they are two-dimensional models according to the manipulated resources.Literature[6] furtherly add visual data muster to RBAC model and proposes a three-dimensional access control model. All of these models only discuss access control model theoretically,and different role-based access control modules in software systems have different instantiation sytles.For example, a RBAC module in one software system can not meet the access control requirements in another system because different RBAC modules have different table fields in order to realize certain requirements. This paper proposes a flexible role-based access control engine which can configure the RBAC module for different systmes according to each customer’s requirement.The engine is a configuration tool and it can realize various RBAC modules which have different table fields in database.The paper is organized as follows.Section I introduces the basic concepts of the NIST RBAC model;Seciton II details the description of RBAC engine model and gives the configuration steps using this engine to generate RBAC instances,and at last section III gives an example and concludes the paper.
Style APA, Harvard, Vancouver, ISO itp.
9

Kim, In-Tae, Kyung-Yong Chung, Kee-Wook Rim i Jung-Hyun Lee. "Dynamic RBAC Model based on OSGi". Journal of the Korea Contents Association 9, nr 1 (28.01.2009): 53–60. http://dx.doi.org/10.5392/jkca.2009.9.1.053.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Editorial Office, OBM Integrative and Complementary Medicine. "An Interview with Dr. Sok Cheon Pak". OBM Integrative and Complementary Medicine 07, nr 03 (20.09.2022): 1–4. http://dx.doi.org/10.21926/obm.icm.2203043.

Pełny tekst źródła
Streszczenie:
Interview with Dr. Sok Cheon Pak.<strong> </strong>Dr Pak as a physiologist currently leads and guides research into nutraceuticals to provide relevant and impactful clinical applications. The best example is the rice bran arabinoxylan compound (RBAC). RBAC is a functional food produced from hydrolysed rice bran denatured with shiitake mushroom enzymes. RBAC demonstrates strong immunomodulatory properties, particularly for enhancing the natural killer cell activity. Additionally, RBAC is a potent antiproliferative food supplement with strong evidence showing that it can arrest tumour proliferation. Dr Pak has recently published a book on RBAC.
Style APA, Harvard, Vancouver, ISO itp.
11

Darwish, Wesam, i Konstantin Beznosov. "Analysis of ANSI RBAC Support in EJB". International Journal of Secure Software Engineering 2, nr 2 (kwiecień 2011): 25–52. http://dx.doi.org/10.4018/jsse.2011040102.

Pełny tekst źródła
Streszczenie:
This paper analyzes access control mechanisms of the Enterprise Java Beans (EJB) architecture and defines a configuration of the EJB protection system in a more precise and less ambiguous language than the EJB 3.0 standard. Using this configuration, the authors suggest an algorithm that formally specifies the semantics of authorization decisions in EJB. The level of support is analyzed for the American National Standard Institute’s (ANSI) specification of Role-Based Access Control (RBAC) components and functional specification in EJB. The results indicate that the EJB specification falls short of supporting even Core ANSI RBAC. EJB extensions dependent on the operational environment are required in order to support ANSI RBAC required components. Other vendor-specific extensions are necessary to support ANSI RBAC optional components. Fundamental limitations exist, however, due to the impracticality of some aspects of the ANSI RBAC standard itself. This paper sets up a framework for assessing implementations of ANSI RBAC for EJB systems.
Style APA, Harvard, Vancouver, ISO itp.
12

Nyame, Gabriel, i Zhiguang Qin. "Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework". Information 11, nr 6 (22.06.2020): 334. http://dx.doi.org/10.3390/info11060334.

Pełny tekst źródła
Streszczenie:
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations. As a socio-technical concept, the notion of role in RBAC has been overemphasized, while very little attention is given to the precursors: role strain, role ambiguity, and role conflict. These constructs provide more significant insights into RBAC design in Knowledge Management Systems (KMS). KMS is the technology-based knowledge management tool used to acquire, store, share, and apply knowledge for improved collaboration and knowledge-value creation. In this paper, we propose eight propositions that require future research concerning the RBAC system for knowledge security. In addition, we propose a model that integrates these precursors and RBAC to deepen the understanding of these constructs. Further, we examine these precursory constructs in a socio-technical fashion relative to RBAC in the organizational context and the status–role relationship effects. We carried out conceptual analysis and synthesis of the relevant literature, and present a model that involves the three essential precursors that play crucial roles in role mining and engineering in RBAC design. Using an illustrative case study of two companies where 63 IT professionals participated in the study, the study established that the precursors positively and significantly increase the intractability of the RBAC system design. Our framework draws attention to both the management of organizations and RBAC system developers about the need to consider and analyze the precursors thoroughly before initiating the processes of policy engineering, role mining, and role engineering. The propositions stated in this study are important considerations for future work.
Style APA, Harvard, Vancouver, ISO itp.
13

Ooi, Soo Liang, Sok Cheon Pak, Peter S. Micalos, Emily Schupfer, Catherine Lockley, Mi Houn Park i Sung-Joo Hwang. "The Health-Promoting Properties and Clinical Applications of Rice Bran Arabinoxylan Modified with Shiitake Mushroom Enzyme—A Narrative Review". Molecules 26, nr 9 (27.04.2021): 2539. http://dx.doi.org/10.3390/molecules26092539.

Pełny tekst źródła
Streszczenie:
Rice bran arabinoxylan compound (RBAC) is derived from defatted rice bran hydrolyzed with Lentinus edodes mycelial enzyme. It has been marketed as a functional food and a nutraceutical with health-promoting properties. Some research has demonstrated this rice bran derivative to be a potent immunomodulator, which also possesses anti-inflammatory, antioxidant, and anti-angiogenic properties. To date, research on RBAC has predominantly focused on its immunomodulatory action and application as a complementary therapy for cancer. Nonetheless, the clinical applications of RBAC can extend beyond cancer therapy. This article is a narrative review of the research on the potential benefits of RBAC for cancer and other health conditions based on the available literature. RBAC research has shown it to be useful as a complementary treatment for cancer and human immunodeficiency virus infection. It can positively modulate serum glucose, lipid and protein metabolism in diabetic patients. Additionally, RBAC has been shown to ameliorate irritable bowel syndrome and protect against liver injury caused by hepatitis or nonalcoholic fatty liver disease. It can potentially ease symptoms in chronic fatigue syndrome and prevent the common cold. RBAC is safe to consume and has no known side effects at the typical dosage of 2–3 g/day. Nevertheless, further research in both basic studies and human clinical trials are required to investigate the clinical applications, mechanisms, and effects of RBAC.
Style APA, Harvard, Vancouver, ISO itp.
14

Lewis, John E., Steven E. Atlas, Oscar L. Higuera, Andrea Fiallo, Ammar Rasul, Ashar Farooqi, Olga Kromo i in. "The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease". Evidence-Based Complementary and Alternative Medicine 2018 (3.05.2018): 1–10. http://dx.doi.org/10.1155/2018/1751583.

Pełny tekst źródła
Streszczenie:
The primary objective of the study was to evaluate the effect of a hydrolyzed polysaccharide, Rice Bran Arabinoxylan Compound (RBAC), on biomarkers in adults with nonalcoholic fatty liver disease (NAFLD). A 90-day randomized double-blind placebo-controlled trial examined the effect of RBAC on complete blood count, liver enzymes, lipids, oxidative stress markers, cytokines, and growth factors. Twenty-three adults with NAFLD were enrolled and randomly assigned to one of the two study conditions (n=12 RBAC and n=11 placebo) and consumed 1 gram/day of either compound for 90 days. Subjects were assessed at baseline and 45 and 90 days. No adverse effects were reported. Alkaline phosphatase significantly decreased (−3.1%; SD=19.9; F[1,19]=5.1, p=0.03) in the RBAC group compared to the placebo group. The percentages of monocytes (17.9%; SD=18.3; F[1,19]=5.9, p=0.02) and eosinophils (30.6%; SD=30.5; F[1,19]=12.3, p<0.01) increased in the RBAC group. IFN-γ (156%; SD=131.8; F[1,19]=4.2, p=0.06) and IL-18 (29.1%; SD=64; F[1,19]=5.3, p=0.03) increased in the RBAC group compared to the placebo group. Other improvements were noted for platelets, neutrophils, neutrophil-lymphocyte ratio, γ-glutamyl transferase, and 4-hydroxynonenal. RBAC had beneficial effects on several biomarkers that adds to the known immunomodulatory activities of RBAC, which may be promising for people with NAFLD.
Style APA, Harvard, Vancouver, ISO itp.
15

de Carvalho Junior, Marcelo Antonio, i Paulo Bandiera-Paiva. "Health Information System Role-Based Access Control Current Security Trends and Challenges". Journal of Healthcare Engineering 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/6510249.

Pełny tekst źródła
Streszczenie:
Objective. This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. Method. We have selected articles related to our investigation theme “RBAC trends and limitations” in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: “Role-Based Access Control” OR “RBAC” AND “Health information System” OR “EHR” AND “Trends” OR “Challenges” OR “Security” OR “Authorization” OR “Attacks” OR “Permission Assignment” OR “Permission Relation” OR “Permission Mapping” OR “Constraint”. We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. Results. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Conclusion. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.
Style APA, Harvard, Vancouver, ISO itp.
16

Zhang, Jian Hua, i Qiang Liu. "An Administration Iteration Problem and its Solution when Deploying the RBAC Model". Applied Mechanics and Materials 263-266 (grudzień 2012): 1584–87. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1584.

Pełny tekst źródła
Streszczenie:
Access control is an important infrastructure of an information system. Role-Based Access Control (RBAC) model is the main-stream access control model. When deploying a RBAC model, there is an administration iteration problem which needs the information engineers to define the administrator structure before running the RBAC model, which make the deploying process redundancy and complex, make the running process rigid, and result in decrease of control capability of RBAC model. We present a top-down method. In this method, we define the administration authority as the source of management authority and set up the right and liability mechanism of RBAC. By this method, the administrator structure will be defined and expanded by administrators according to application requirements, and the right and liability mechanism can make sure these administrators should perform their management authorities responsibly and legally. Our method can solve the administration iteration problem and improve the flexibility of RBAC model.
Style APA, Harvard, Vancouver, ISO itp.
17

Lu, Haibing, Yuan Hong, Yanjiang Yang, Lian Duan i Nazia Badar. "Towards user-oriented RBAC model". Journal of Computer Security 23, nr 1 (15.03.2015): 107–29. http://dx.doi.org/10.3233/jcs-140519.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Chen, Hsing-Chung, Marsha Anjanette Violetta i Cheng-Ying Yang. "Contract RBAC in cloud computing". Journal of Supercomputing 66, nr 2 (1.10.2013): 1111–31. http://dx.doi.org/10.1007/s11227-013-1017-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Habib, Muhammad Asif, i Qaisar Abbas. "Mutually exclusive permissions in RBAC". International Journal of Internet Technology and Secured Transactions 4, nr 2/3 (2012): 207. http://dx.doi.org/10.1504/ijitst.2012.047962.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Bertino, Elisa. "RBAC models — concepts and trends". Computers & Security 22, nr 6 (wrzesień 2003): 511–14. http://dx.doi.org/10.1016/s0167-4048(03)00609-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Zhao, Yu Lan, i Chun Feng Jiang. "Research of Access Control Models in Personal Networks". Advanced Materials Research 989-994 (lipiec 2014): 4751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4751.

Pełny tekst źródła
Streszczenie:
How to prevent illegal users from sharing system resources was one of the main purposes for MAGNET Security Group. This paper introduced some major access control models such as traditional access control models, role-based access control model (RBAC), task-based access control model (TBAC) and role-task-based access control model (T-RBAC). In the end, a feasible scheme PN_T-RBAC was proposed at the base of the T-RBAC model in existence, which was suitable for the coalition environment of personal networks.
Style APA, Harvard, Vancouver, ISO itp.
22

Lewis, John E., Steven E. Atlas, Oscar L. Higuera, Andrea Fiallo, Ammar Rasul, Ashar Farooqi, Olga Kromo i in. "Corrigendum to “The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease”". Evidence-Based Complementary and Alternative Medicine 2020 (7.04.2020): 1–10. http://dx.doi.org/10.1155/2020/9575878.

Pełny tekst źródła
Streszczenie:
The primary objective of the study was to evaluate the effect of a hydrolyzed polysaccharide, Rice Bran Arabinoxylan Compound (RBAC), on biomarkers in adults with nonalcoholic fatty liver disease (NAFLD). A 90-day randomized double-blind placebo-controlled trial examined the effect of RBAC on complete blood count, liver enzymes, lipids, oxidative stress markers, cytokines, and growth factors. Twenty-three adults with NAFLD were enrolled and randomly assigned to one of the two study conditions (n = 12 RBAC and n = 11 placebo) and consumed 1 gram/day of either compound for 90 days. Subjects were assessed at baseline and 45 and 90 days. No adverse effects were reported. Alkaline phosphatase significantly decreased (−3.1%; SD = 19.9; F[1, 19] = 5.1, p=0.03) in the RBAC group compared to placebo. Percent monocytes (17.9%; SD = 18.3; F[1, 19] = 5.9, p=0.02) and percent eosinophils (30.6%; SD = 30.5; F[1, 19] = 12.3, p<0.01) increased in the RBAC group. IFN-γ (156%; SD = 131.8; F[1, 19] = 4.2, p=0.06) and IL-18 (29.1%; SD = 64; F[1, 19] = 5.3, p=0.03) increased in the RBAC group compared to placebo. Other improvements were noted for platelets, neutrophils, neutrophil-lymphocyte ratio, γ-glutamyl transferase, and 4-hydroxynonenal. RBAC had beneficial effects on several biomarkers that add to the known immunomodulatory activities of RBAC, which may be promising for people with NAFLD. This trial is registered with NCT02568787.
Style APA, Harvard, Vancouver, ISO itp.
23

Wainer, Jacques, Paulo Barthelmess i Akhil Kumar. "W-RBAC — A Workflow Security Model Incorporating Controlled Overriding of Constraints". International Journal of Cooperative Information Systems 12, nr 04 (grudzień 2003): 455–85. http://dx.doi.org/10.1142/s0218843003000814.

Pełny tekst źródła
Streszczenie:
This paper presents a pair of role-based access control models for workflow systems, collectively known as the W-RBAC models. The first of these models, W0-RBAC is based on a framework that couples a powerful RBAC-based permission service and a workflow component with clear separation of concerns for ease of administration of authorizations. The permission service is the focus of the work, providing an expressive logic-based language for the selection of users authorized to perform workflow tasks, with preference ranking. W1-RBAC extends the basic model by incorporating exception handling capabilities through controlled and systematic overriding of constraints.
Style APA, Harvard, Vancouver, ISO itp.
24

Aftab, Muhammad Umar, Zhiguang Qin, Negalign Wake Hundera, Oluwasanmi Ariyo, Zakria, Ngo Tung Son i Tran Van Dinh. "Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model". Symmetry 11, nr 5 (15.05.2019): 669. http://dx.doi.org/10.3390/sym11050669.

Pełny tekst źródła
Streszczenie:
A major development in the field of access control is the dominant role-based access control (RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the concept of roles. In addition, attribute-based access control (ABAC) is added to the access control models, which is famous for its dynamic behavior. Separation of duty (SOD) is used for enforcing least privilege concept in RBAC and ABAC. Moreover, SOD is a powerful tool that is used to protect an organization from internal security attacks and threats. Different problems have been found in the implementation of SOD at the role level. This paper discusses that the implementation of SOD on the level of roles is not a good option. Therefore, this paper proposes a hybrid access control model to implement SOD on the basis of permissions. The first part of the proposed model is based on the addition of attributes with dynamic characteristics in the RBAC model, whereas the second part of the model implements the permission-based SOD in dynamic RBAC model. Moreover, in comparison with previous models, performance and feature analysis are performed to show the strength of dynamic RBAC model. This model improves the performance of the RBAC model in terms of time, dynamicity, and automatic permissions and roles assignment. At the same time, this model also reduces the administrator’s load and provides a flexible, dynamic, and secure access control model.
Style APA, Harvard, Vancouver, ISO itp.
25

Tian, Wan Li, Lian Zhong Liu i Meng Liu. "Roles Generation for Applications in RBAC Model". Applied Mechanics and Materials 411-414 (wrzesień 2013): 35–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.35.

Pełny tekst źródła
Streszczenie:
RBAC has been widely used for the reason of its efficiency, convenience and safety. But as the traditional user-oriented access control strategy, the RBAC carries the disadvantage of user-oriented access control as well. It always assumes that the application is credible and the behavior of the program represents the wishes of the user. However, this assumption is increasingly proving to be false and numbers of prevalent types of security attacks leverage this weakness to misuse the authority of users. Based on RBAC and learn from the concept of FBAC, this paper will proposed a solution about generating roles for application.
Style APA, Harvard, Vancouver, ISO itp.
26

Panzarini, Elisa, Valentina Inguscio i Luciana Dini. "Overview of Cell Death Mechanisms Induced by Rose Bengal Acetate-Photodynamic Therapy". International Journal of Photoenergy 2011 (2011): 1–11. http://dx.doi.org/10.1155/2011/713726.

Pełny tekst źródła
Streszczenie:
Photodynamic Therapy (PDT) is a non-invasive treatment for different pathologies, cancer included, using three key components: non-toxic light-activated drug (Photosensitizer, PS), visible light, and oxygen. Their interaction triggers photochemical reactions leading to Reactive Oxygen Species (ROS) generation, that mediate cytotoxicity and cell death. In the present paper, the most important findings about the synthetic dye Rose Bengal Acetate (RBAc), an emerging photosensitizer for its efficient induction of cell death, will be reported with the aim to integrate RBAc phototoxicity to novel therapeutic PDT strategies against tumour cells. After its perinuclear intracellular localization, RBAc causes multiple subcellular organelles damage, that is, mitochondria, Endoplasmic Reticulum (ER), lysosomes, and Golgi complex. Indeed, RBAc exerts long-term phototoxicity through activation of both caspase-independent and- dependent apoptotic pathways and autophagic cell death. In particular, this latter cell death type may promote cell demise when apoptotic machinery is defective. The deep knowledge of RBAc photocytotoxicity will allow to better understand its potential photomedicine application in cancer.
Style APA, Harvard, Vancouver, ISO itp.
27

LIN, CHIH-MIN, ANG-BUNG TING, CHUN-FEI HSU i CHAO-MING CHUNG. "ADAPTIVE CONTROL FOR MIMO UNCERTAIN NONLINEAR SYSTEMS USING RECURRENT WAVELET NEURAL NETWORK". International Journal of Neural Systems 22, nr 01 (luty 2012): 37–50. http://dx.doi.org/10.1142/s0129065712002992.

Pełny tekst źródła
Streszczenie:
Recurrent wavelet neural network (RWNN) has the advantages such as fast learning property, good generalization capability and information storing ability. With these advantages, this paper proposes an RWNN-based adaptive control (RBAC) system for multi-input multi-output (MIMO) uncertain nonlinear systems. The RBAC system is composed of a neural controller and a bounding compensator. The neural controller uses an RWNN to online mimic an ideal controller, and the bounding compensator can provide smooth and chattering-free stability compensation. From the Lyapunov stability analysis, it is shown that all signals in the closed-loop RBAC system are uniformly ultimately bounded. Finally, the proposed RBAC system is applied to the MIMO uncertain nonlinear systems such as a mass-spring-damper mechanical system and a two-link robotic manipulator system. Simulation results verify that the proposed RBAC system can achieve favorable tracking performance with desired robustness without any chattering phenomenon in the control effort.
Style APA, Harvard, Vancouver, ISO itp.
28

Rashid, Mamoon, i Er Rishma Chawla. "Securing Data Storage By Extending Role-Based Access Control". International Journal of Cloud Applications and Computing 3, nr 4 (październik 2013): 28–37. http://dx.doi.org/10.4018/ijcac.2013100103.

Pełny tekst źródła
Streszczenie:
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, the authors highlight the drawbacks of RBAC models in terms of access control and authorization and later provide a more viable extended-RBAC model, which enhances and extends its powers to make any Cloud Server more secure by adding valuable constraints. Later the Blobs are stored on cloud server which is then accessed by the end users via this Extended RBAC model. The authors describe a practical implementation of the proposed extended RBAC based architecture and discuss the performance results with its base models. The authors later show how the users with different premiums can access this architecture in a better way and also how the unknown users for this architecture can be denied the usage of services by adding valuable constraints.
Style APA, Harvard, Vancouver, ISO itp.
29

KUHLMANN, MIRCO, KARSTEN SOHR i MARTIN GOGOLLA. "Employing UML and OCL for designing and analysing role-based access control". Mathematical Structures in Computer Science 23, nr 4 (8.07.2013): 796–833. http://dx.doi.org/10.1017/s0960129512000266.

Pełny tekst źródła
Streszczenie:
The stringent security requirements of organisations like banks or hospitals frequently adopt role-based access control (RBAC) principles to represent and simplify their internal permission management. While representing a fundamental advanced RBAC concept enabling precise restrictions on access rights, authorisation constraints increase the complexity of the resulting security policies so that tool support for convenient creation and adequate validation is required. A particular contribution of our work is a new approach to developing and analysing RBAC policies using a UML-based domain-specific language (DSL), which allows the hiding of the mathematical structures of the underlying authorisation constraints implemented in OCL. The DSL we present is highly configurable and extensible with respect to new concepts and classes of authorisation constraints, and allows the developer to validate RBAC policies in an effective way. The handling of dynamic (that is, time-dependent) constraints, their visual representation through the RBAC DSL and their analysis all form another part of our contribution. The approach is supported by a UML and OCL validation tool.
Style APA, Harvard, Vancouver, ISO itp.
30

Chen, Hsing-Chung, Marsha Violetta, Chien-Erh Weng i Tzu-Liang Kung. "Cognitive RBAC in mobile heterogeneous networks". Computer Science and Information Systems 10, nr 2 (2013): 779–806. http://dx.doi.org/10.2298/csis121110034c.

Pełny tekst źródła
Streszczenie:
In communication networks, a cognitive network (CN) is a new type of data network which is used to solve some of the problems that face current networks. Cognitive radio (CR) is part of a cognitive network and a smart wireless communication system. CR is conscious of its surrounding environment, and learns from the environment. It adapts its internal states by making corresponding real-time changes in certain operating parameters. In this paper, we propose a novel Cognitive RBAC (Role-Based Access Control) scheme which can be applied to Mobile Heterogeneous Networks (MHNs). The MHNs consist of mobile communication systems and Wi-Fi systems. The required new definitions for the RBAC model are proposed in this paper. They can improve the ability of conventional RBAC model to meet new challenges. In our scheme, we assume that a Cognitive Server (CS) provides and manages the permissions of services, and Network Providers support and manage a variety CRs and CNs, individually. For more efficiently managing CR and CN and meeting the large scale heterogeneous networks, we let mobile user can perceive network candidate actively to access services, in which the permissions are depending to the contract made by CS with each Network Provider. In this paper, the new generalized cognitive RBAC model and their definitions are proposed, and could be applied to new applications in a MHNs environment.
Style APA, Harvard, Vancouver, ISO itp.
31

Celikel, Ebru, Murat Kantarcioglu, Bhavani Thuraisingham i Elisa Bertino. "A risk management approach to RBAC". Risk and Decision Analysis 1, nr 1 (2009): 21–33. http://dx.doi.org/10.3233/rda-2008-0002.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

BOUADJEMI, Abdelkrim, i Mustapha Kamel ABDI. "Towards An Extension Of RBAC Model". International Journal of Computing and Digital Systems 10, nr 1 (25.11.2021): 1145–55. http://dx.doi.org/10.12785/ijcds/1001103.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Baek, Kyeong-Dong, i Dong-Gue Park. "Emergency RBAC System based on Blockchain". Journal of Korean Institute of Information Technology 20, nr 3 (31.03.2022): 79–93. http://dx.doi.org/10.14801/jkiit.2022.20.3.79.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Batra, Gunjan, Vijayalakshmi Atluri, Jaideep Vaidya i Shamik Sural. "Deploying ABAC policies using RBAC systems". Journal of Computer Security 27, nr 4 (18.07.2019): 483–506. http://dx.doi.org/10.3233/jcs-191315.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Cai, Ting, Jian Zheng i Xing Du. "A Hybrid Attribute based RBAC Model". International Journal of Security and Its Applications 9, nr 7 (31.07.2015): 317–28. http://dx.doi.org/10.14257/ijsia.2015.9.7.29.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

He, Yongzhong. "Implementing Chinese Wall Policies on RBAC". Journal of Computer Research and Development 44, nr 4 (2007): 615. http://dx.doi.org/10.1360/crad20070410.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

He, Yongzhong. "Implementing Chinese Wall Policies on RBAC". Journal of Computer Research and Development 44, nr 5 (2007): 615. http://dx.doi.org/10.1360/crad20070510.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Chen, Hsing Chung. "A negotiation-based cooperative RBAC scheme". International Journal of Web and Grid Services 13, nr 1 (2017): 94. http://dx.doi.org/10.1504/ijwgs.2017.082076.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Chen, Hsing Chung. "A negotiation-based cooperative RBAC scheme". International Journal of Web and Grid Services 13, nr 1 (2017): 94. http://dx.doi.org/10.1504/ijwgs.2017.10002866.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Ben-Ghorbel-Talbi, Meriam, Frédéric Cuppens, Nora Cuppens-Boulahia i Adel Bouhoula. "A delegation model for extended RBAC". International Journal of Information Security 9, nr 3 (1.05.2010): 209–36. http://dx.doi.org/10.1007/s10207-010-0104-3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

Koch, Manuel, Luigi V. Mancini i Francesco Parisi-Presicce. "A graph-based formalism for RBAC". ACM Transactions on Information and System Security 5, nr 3 (sierpień 2002): 332–65. http://dx.doi.org/10.1145/545186.545191.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Wei, Qiang, Jason Crampton, Konstantin Beznosov i Matei Ripeanu. "Authorization recycling in hierarchical RBAC systems". ACM Transactions on Information and System Security 14, nr 1 (maj 2011): 1–29. http://dx.doi.org/10.1145/1952982.1952985.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Colantonio, Alessandro, Roberto Di Pietro, Alberto Ocello i Nino Vincenzo Verde. "Taming role mining complexity in RBAC". Computers & Security 29, nr 5 (lipiec 2010): 548–64. http://dx.doi.org/10.1016/j.cose.2010.01.001.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Song, Wan Li, Hai Fei Zhang, Wei Feng Wu i Wen Jie He. "An Improved RBAC Model and its Application in Development of Information System". Advanced Materials Research 989-994 (lipiec 2014): 4650–53. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4650.

Pełny tekst źródła
Streszczenie:
Aiming at the deficiencies of traditional RBAC model, on the basis of studying of the models introduced in the literatures published, this paper puts forwards an improved model--MR-RBAC, including its concepts and design. This model is implemented by adding restriction strategy on the operation objects and data objects, assignment different privileges to different users via configuration mapping of functions and menus. The implementation and practice indicates that the MR-RBAC model not only simplifies privilege management, but also improves the system security and privileges management flexibility.
Style APA, Harvard, Vancouver, ISO itp.
45

Das, Dipta, Andrew Walker, Vincent Bushong, Jan Svacina, Tomas Cerny i Vashek Matyas. "On automated RBAC assessment by constructing a centralized perspective for microservice mesh". PeerJ Computer Science 7 (1.02.2021): e376. http://dx.doi.org/10.7717/peerj-cs.376.

Pełny tekst źródła
Streszczenie:
It is important in software development to enforce proper restrictions on protected services and resources. Typically software services can be accessed through REST API endpoints where restrictions can be applied using the Role-Based Access Control (RBAC) model. However, RBAC policies can be inconsistent across services, and they require proper assessment. Currently, developers use penetration testing, which is a costly and cumbersome process for a large number of APIs. In addition, modern applications are split into individual microservices and lack a unified view in order to carry out automated RBAC assessment. Often, the process of constructing a centralized perspective of an application is done using Systematic Architecture Reconstruction (SAR). This article presents a novel approach to automated SAR to construct a centralized perspective for a microservice mesh based on their REST communication pattern. We utilize the generated views from SAR to propose an automated way to find RBAC inconsistencies.
Style APA, Harvard, Vancouver, ISO itp.
46

Liu, Kui, Zhurong Zhou, Qianguo Chen i Xiaoli Yang. "Towards a RBAC Workflow Model for Thesis Management". Journal of Software 10, nr 4 (kwiecień 2015): 480–90. http://dx.doi.org/10.17706/jsw.10.4.480-490.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Hwang, Jeong-Hee, Moon-Sun Shin, Jong-Yun Lee i Ik-Soo Hwang. "RBAC Based Security Model for International Logistic Service". KIPS Transactions:PartC 16C, nr 3 (30.06.2009): 307–16. http://dx.doi.org/10.3745/kipstc.2009.16-c.3.307.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Fragkos, Georgios, Jay Johnson i Eirini Eleni Tsiropoulou. "Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations". Energies 15, nr 17 (1.09.2022): 6375. http://dx.doi.org/10.3390/en15176375.

Pełny tekst źródła
Streszczenie:
A global transition to power grids with high penetrations of renewable energy generation is being driven in part by rapid installations of distributed energy resources (DER). New DER equipment includes standardized IEEE 1547-2018 communication interfaces and proprietary communications capabilities. Interoperable DER provides new monitoring and control capabilities. The existence of multiple entities with different roles and responsibilities within the DER ecosystem makes the Access Control (AC) mechanism necessary. In this paper, we introduce and compare two novel architectures, which provide a Role-Based Access Control (RBAC) service to the DER ecosystem’s entities. Selecting an appropriate RBAC technology is important for the RBAC administrator and users who request DER access authorization. The first architecture is centralized, based on the OpenLDAP, an open source implementation of the Lightweight Directory Access Protocol (LDAP). The second approach is decentralized, based on a private Ethereum blockchain test network, where the RBAC model is stored and efficiently retrieved via the utilization of a single Smart Contract. We have implemented two end-to-end Proofs-of-Concept (PoC), respectively, to offer the RBAC service to the DER entities as web applications. Finally, an evaluation of the two approaches is presented, highlighting the key speed, cost, usability, and security features.
Style APA, Harvard, Vancouver, ISO itp.
49

Yang, Jiyong, Xiajiong Shen, Wan Chen, Qiang Ge, Lei Zhang i HaoLin Chen. "A Model Study on Collaborative Learning and Exploration of RBAC Roles". Wireless Communications and Mobile Computing 2021 (24.06.2021): 1–9. http://dx.doi.org/10.1155/2021/5549109.

Pełny tekst źródła
Streszczenie:
Role-based access control (RBAC) can effectively guarantee the security of user system data. With its good flexibility and security, RBAC occupies a mainstream position in the field of access control. However, the complexity and time-consuming of the role establishment process seriously hinder the development and application of the RBAC model. The introduction of the assistant interactive question answering algorithm based on attribute exploration (semiautomatic heuristic way to build an RBAC system) greatly reduces the complexity of building a role system. However, there are some defects in the auxiliary interactive Q&A algorithm based on attribute exploration. The algorithm is not only unable to support multiperson collaborative work but also difficult to find qualified Q&A experts in practical work. Aiming at the above problems, this paper proposes a model collaborative learning and exploration of RBAC roles under the framework of attribute exploration. In this model, after interactive Q&A with experts in different permissions systems by using attribute exploration, the obtained results are merged and calculated to get the correct role system. This model not only avoids the time-consuming process of role requirement analysis but also provides a feasible scheme for collaborative role discovery in multidepartment permissions.
Style APA, Harvard, Vancouver, ISO itp.
50

Deng, Ji Qiu, Xiao Qing Luo i Huang Ling Gu. "The Design and Implementation of G-RBAC Model in Map Permission". Advanced Materials Research 268-270 (lipiec 2011): 1457–61. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1457.

Pełny tekst źródła
Streszczenie:
With the development of WebGIS, it plays a more and more important role in government and enterprises. The effective way to access and control spatial data, because of relating to the security and business secrets of government and enterprises, becomes an urgent concern for them. Now, RBAC (Role Based Access Control) can be a valid method to access and control uniform resource, but it is lack of flexibility and real-time ability to control spatial data in WebGIS. For that, this paper proposes G-RBAC model based on RBAC model to enhance the flexibility and real-time ability to access spatial data.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii