Sciweavers

116 search results - page 1 / 24
» Role-Based Access Control Requirements Model with Purpose Ex...
Sort
View
WER
2007
Springer
13 years 11 months ago
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control (RBAC) is increasingly used for ensuring security and privacy in complex organizations such as healthcare institutions. In RBAC, access permissions are g...
Faranak Farzad, Eric Yu, Patrick C. K. Hung
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 6 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
SEC
2007
13 years 6 months ago
Extending Role Based Access Control Model for Distributed Multidomain Applications
This paper presents the results related to the development of a flexible domain-based access control infrastructure for distributed Grid-based Collaborative Environments and Comple...
Yuri Demchenko, Leon Gommans, Cees de Laat
RBAC
1997
135views more  RBAC 1997»
13 years 6 months ago
Reconciling role based management and role based access control
Role Based Access Control is only a subset of the security management and distributed systems management. Yet, the characteristics and use of the role objects in RBAC or Role Base...
Emil Lupu, Morris Sloman
RBAC
1997
234views more  RBAC 1997»
13 years 6 months ago
Comparing simple role based access control models and access control lists
The RBAC metaphor is powerful in its ability to express access control policy in terms of the way in which administrators view organizations. The functionality of simple Role Base...
John F. Barkley