X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (765) 765
Journal Article (667) 667
Dissertation (102) 102
Book Chapter (46) 46
Publication (41) 41
Magazine Article (9) 9
Government Document (6) 6
Reference (2) 2
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
rbac (1135) 1135
access control (675) 675
security (201) 201
authorization (189) 189
role-based access control (173) 173
permission (141) 141
computer science (108) 108
computer science, information systems (103) 103
information security (90) 90
computational modeling (66) 66
analysis (61) 61
authentication (61) 61
computer science, software engineering (61) 61
role mining (59) 59
policies (56) 56
cloud computing (55) 55
role (51) 51
访问控制 (50) 50
context (49) 49
data security (49) 49
role based access control (49) 49
role engineering (49) 49
information systems (48) 48
zugriffskontrolle (48) 48
xacml (46) 46
business (44) 44
privacy (44) 44
computer information security (41) 41
organizations (40) 40
protection (40) 40
computer science, theory & methods (39) 39
delegation (39) 39
educational institutions (38) 38
xml (38) 38
computer security (37) 37
databases (37) 37
web services (37) 37
management (36) 36
workflow (36) 36
mathematical models (35) 35
collaboration (34) 34
control systems (34) 34
standards (33) 33
computer communication networks (32) 32
internet (32) 32
mac (32) 32
abac (31) 31
engineering, electrical & electronic (30) 30
角色 (30) 30
algorithms (29) 29
uml (29) 29
application software (28) 28
collaborative work (27) 27
unified modeling language (27) 27
rbac model (26) 26
conferences (25) 25
resource management (25) 25
servers (25) 25
context modeling (24) 24
cryptography (24) 24
medical services (24) 24
studies (24) 24
dac (23) 23
information technology (23) 23
rbac模型 (23) 23
software (23) 23
computer science, hardware & architecture (22) 22
data mining (22) 22
encryption (22) 22
software engineering (22) 22
constraints (21) 21
model (21) 21
ontology (21) 21
separation of duty (21) 21
computers (20) 20
data models (20) 20
models (20) 20
semantics (20) 20
berechtigungskontrolle (19) 19
multi-domain (19) 19
nist (19) 19
trust (19) 19
information systems applications (18) 18
roles (18) 18
security management (18) 18
telecommunications (18) 18
artificial intelligence (17) 17
companies (17) 17
security policy (17) 17
technology management (17) 17
computer science, artificial intelligence (16) 16
engineering (16) 16
monitoring (16) 16
object oriented modeling (16) 16
role hierarchy (16) 16
systems (16) 16
analytical models (15) 15
availability (15) 15
grid security (15) 15
information management (15) 15
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (1227) 1227
Chinese (223) 223
Korean (17) 17
Japanese (6) 6
Portuguese (4) 4
French (3) 3
Lithuanian (2) 2
Spanish (2) 2
German (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2014, ISBN 3642406327, Volume 272, Issue 3, 8
Reference
International Journal of Information Management, ISSN 0268-4012, 02/2017, Volume 37, Issue 1, pp. 1539 - 1550
With the progress of new technologies of information management, Ubiquitous Resource Management (URM) is a dominant areas of research which requires efficient... 
Negotiation-based RBAC | Ubiquitous RBAC | Case-based reasoning management | Information management | RBAC | Role assignment management | INFORMATION SCIENCE & LIBRARY SCIENCE | Analysis | Models
Journal Article
Symmetry, ISSN 2073-8994, 05/2019, Volume 11, Issue 5, p. 669
A major development in the field of access control is the dominant role-based access control (RBAC) scheme. The fascination of RBAC lies in its enhanced... 
Hybrid Access Control | Permission based SOD | Attributed RBAC | Dynamic RBAC | Efficient SOD | RBAC | MULTIDISCIPLINARY SCIENCES | ABAC | VERIFICATION
Journal Article
2014, ISBN 9788132216940, Volume 250, 10
Reference
Security and Communication Networks, ISSN 1939-0114, 03/2016, Volume 9, Issue 5, pp. 429 - 439
This paper describes how location‐aware role‐based access control (RBAC) can be implemented on top of the Geospatial eXtensible Access Control Markup Language... 
GeoXACML | location‐aware RBAC | mobile security | Location-aware RBAC | Mobile security | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | RBAC | location-aware RBAC
Journal Article
Computers & Security, ISSN 0167-4048, 2009, Volume 28, Issue 5, pp. 260 - 275
Role-Based Access Control (RBAC) has become a popular technique for security purposes with increasing accessibility of information and data, especially in... 
Access control | Group-based RBAC | RBAC | Secure collaborations | GB-RBAC | COMPUTER SCIENCE, INFORMATION SYSTEMS | Security management | Analysis | Universities and colleges
Journal Article
扬州职业大学学报, ISSN 1008-3693, 2017, Volume 21, Issue 2, pp. 37 - 39
浅析基于角色的访问控制模型(RBAC)在实际应用中的不足,在RBAC理论基础上提出了一种基于角色和属性的访问控制模型(RABAC),在RBAC中加入属性概念,使得授权更灵活且符合最小权限原则,利用形式规约对RABAC进行描述,理论上验证其有效性和可行性。 
角色 | 属性 | RBAC
Journal Article
International Journal of Engineering and Technology(UAE), 2018, Volume 7, Issue 4, pp. 24 - 27
Journal Article
Studies in Health Technology and Informatics, ISSN 0926-9630, 2018, Volume 247, pp. 411 - 415
This article describes the implementation of a solution for the integration of ownership concept and access control over medical imaging resources, making... 
Medical imaging | RBAC | DICOM | Shared repositories
Conference Proceeding
International Journal of Pure and Applied Mathematics, ISSN 1311-8080, 2017, Volume 116, Issue 24, pp. 539 - 548
Journal Article
Computers & Security, ISSN 0167-4048, 07/2016, Volume 60, pp. 52 - 61
The traditional role-based access control (RBAC) model is typically static, i.e., permissions are granted based on a policy that seldom changes. A more... 
User assignment | Transformation | RBAC model | BTG-RBAC model | User permissions | ACCESS-CONTROL | COMPUTER SCIENCE, INFORMATION SYSTEMS
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2012, Volume 7531, pp. 84 - 96
Conference Proceeding
Applied Mechanics and Materials, ISSN 1660-9336, 2014, Volume 644-650, pp. 3251 - 3255
Nowadays Role-Based Access Control (RBAC) is widely used in privilege management framework. In the paper, by the multi – granularity, it realized the effective... 
RBAC | AOP | Multi granularity
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 9407, pp. 312 - 318
Journal Article
Proceedings of the 13th ACM conference on computer and communications security, ISSN 1543-7221, 10/2006, pp. 144 - 153
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control... 
RBAC | role mining | role engineering | Role engineering | Role mining
Conference Proceeding
Mathematical and Computer Modelling, ISSN 0895-7177, 09/2013, Volume 58, Issue 5-6, pp. 1267 - 1288
In communication networks, a cognitive network (CN) is a new type of data network which is used to solve some of the problems that face current networks.... 
RBAC | Small heterogeneous networks | Cognitive networks | Handover | Cognitive server | Cognitive radio | Negotiation RBAC | MATHEMATICS, APPLIED
Journal Article
Journal of Theoretical and Applied Information Technology, ISSN 1992-8645, 10/2018, Volume 96, Issue 20, pp. 6948 - 6954
Journal Article
Journal of Information and Optimization Sciences, ISSN 0252-2667, 02/2019, Volume 40, Issue 2, pp. 203 - 217
Enforcing proper access control is essential for ensuring the security of sensitive resources in an organization. Access control models like the Role-Based... 
68U99 | User-Permission Assignments | Access Control | Spatial Constraints | Spatio-Temporal RBAC | Spatial RBAC
Journal Article
International Journal of Web and Grid Services, ISSN 1741-1106, 2017, Volume 13, Issue 1, pp. 94 - 111
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.