Academic literature on the topic 'RBAC'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RBAC.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "RBAC"
Wang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.
Full textEditorial Office, OBM Integrative and Complementary Medicine. "An Interview with Dr. Sok Cheon Pak." OBM Integrative and Complementary Medicine 07, no. 03 (2022): 1–4. http://dx.doi.org/10.21926/obm.icm.2203043.
Full textMarquis, Yewande Alice. "From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts." Journal of Engineering Research and Reports 26, no. 5 (2024): 138–54. http://dx.doi.org/10.9734/jerr/2024/v26i51141.
Full textM Sahyudi and Erliyan Redy Susanto. "Analisis Implementasi Sistem Keamanan Basis Data Berbasis Role-Based Access Control (RBAC) pada Aplikasi Enterprise Resource Planning." SATESI: Jurnal Sains Teknologi dan Sistem Informasi 5, no. 1 (2025): 105–16. https://doi.org/10.54259/satesi.v5i1.3997.
Full textNyame, Gabriel, and Zhiguang Qin. "Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework." Information 11, no. 6 (2020): 334. http://dx.doi.org/10.3390/info11060334.
Full textOoi, Soo Liang, Peter S. Micalos, and Sok Cheon Pak. "Modified Rice Bran Arabinoxylan by Lentinus edodes Mycelial Enzyme as an Immunoceutical for Health and Aging—A Comprehensive Literature Review." Molecules 28, no. 17 (2023): 6313. http://dx.doi.org/10.3390/molecules28176313.
Full textOoi, Soo Liang, Sok Cheon Pak, Peter S. Micalos, et al. "The Health-Promoting Properties and Clinical Applications of Rice Bran Arabinoxylan Modified with Shiitake Mushroom Enzyme—A Narrative Review." Molecules 26, no. 9 (2021): 2539. http://dx.doi.org/10.3390/molecules26092539.
Full textLewis, John E., Steven E. Atlas, Oscar L. Higuera, et al. "The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease." Evidence-Based Complementary and Alternative Medicine 2018 (May 3, 2018): 1–10. http://dx.doi.org/10.1155/2018/1751583.
Full textde Carvalho Junior, Marcelo Antonio, and Paulo Bandiera-Paiva. "Health Information System Role-Based Access Control Current Security Trends and Challenges." Journal of Healthcare Engineering 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/6510249.
Full textMitra, Barsha, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri. "Migrating from RBAC to temporal RBAC." IET Information Security 11, no. 5 (2017): 294–300. http://dx.doi.org/10.1049/iet-ifs.2016.0258.
Full textDissertations / Theses on the topic "RBAC"
Guo, Yuxia. "User/group administration for RBAC." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0001/MQ42067.pdf.
Full textKhambhammettu, Hemanth. "Enforcing complex policies in RBAC." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529765.
Full textBuccelli, Emanuele. "Ingegnerizzazione di RBAC-MAS in TuCSoN." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8462/.
Full textDarwish, Wesam M. "Analysis of ANSI RBAC support in commercial middleware." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/7147.
Full textMa, Mingchao. "Distributed RBAC for subscription-based remote network services." Thesis, University of Greenwich, 2007. http://gala.gre.ac.uk/6232/.
Full textRegateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.
Full textSquarcina, Marco <1984>. "Granalyze: towards the automatic verification of Grsecurity RBAC policies." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4729.
Full textCosta, Vanderlei Ferreira da. "Autorização integrada entre portais e Globus baseada no modelo RBAC." Universidade Católica de Santos, 2008. http://biblioteca.unisantos.br:8181/handle/tede/603.
Full textDamasceno, Carlos Diego Nascimento. "Evaluating finite state machine based testing methods on RBAC systems." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-11112016-101158/.
Full textGoran, Sladić. "Model kontekstno zavisne kontrole pristupa u poslovnim sistemima." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2011. http://dx.doi.org/10.2298/NS2011SLADICGORAN.
Full textBooks on the topic "RBAC"
Fischer-Hellmann, Klaus-Peter. Information Flow Based Security Control Beyond RBAC. Edited by Rainer Bischoff. Springer Fachmedien Wiesbaden, 2012. http://dx.doi.org/10.1007/978-3-8348-2618-3.
Full textFilho, Oscar Gomes. RBAC, Rio Branco Atlético Clube: História e conquistas, 1913-1987. [s.n.], 2002.
Find full textassot͡siat͡sii͡a, Rossiĭskai͡a bibliotechnai͡a. RBA. Rossiĭskai͡a bibliotechnai͡a assot͡siat͡sii͡a, 2005.
Find full textMeroni, Germana, ed. TRIM/RBCC Proteins. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5398-7.
Full textSbrang char rtsom sgrig khang. Lang tshoʼi rbab chu. Mtsho-sngon Mi-rigs Dpe-skrun Khang, 2016.
Find full textCorp, INDUS, and United States. Environmental Protection Agency. Control Technology Center, eds. User's manual for the RBLC BBS. Control Technology Center, U.S. Environmental Protection Agency, 1997.
Find full textKatcharian, Hope. Risk-Based Corrective Action (RBCA) at petroleum contaminated sites: The rationale for RBCA and natural attenuation. Available from National Technical Information Service, 1997.
Find full textCorp, INDUS, Clean Air Technology Center (U.S.), and United States. Environmental Protection Agency. Office of Air Quality Planning and Standards. Information Transfer Group, eds. User's manual for the RBLC data base. Information Transfer Group, Office of Air Quality Planning and Standards, U.S. Environmental Protection Agency, 1998.
Find full textBook chapters on the topic "RBAC"
Subramanian, Shiva. "Kubernetes RBAC." In Deploy Container Applications Using Kubernetes. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9277-8_11.
Full textWang, Lunwei, Lifeng Wei, Xiangke Liao, and Huaimin Wang. "AT-RBAC: An Authentication Trustworthiness-Based RBAC Model." In Grid and Cooperative Computing - GCC 2004 Workshops. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30207-0_43.
Full textMolesini, Ambra, Enrico Denti, and Andrea Omicini. "RBAC-MAS and SODA: Experimenting RBAC in AOSE." In Engineering Societies in the Agents World IX. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02562-4_4.
Full textOleshchuk, Vladimir. "Trust-Aware RBAC." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8_9.
Full textZhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_1509-2.
Full textBarker, Steve, Paul Douglas, and Terry Fanning. "Implementing RBAC Policies." In Research Directions in Data and Applications Security. Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35697-6_3.
Full textZhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1509.
Full textZhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1509.
Full textChandran, Suroop Mohan, and J. B. D. Joshi. "LoT-RBAC: A Location and Time-Based RBAC Model." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11581062_27.
Full textDing, Yi, Jun Jin, Jinglun Zhang, Zhongyi Wu, and Kai Hu. "SC-RBAC: A Smart Contract based RBAC Model for DApps." In Human Centered Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37429-7_8.
Full textConference papers on the topic "RBAC"
Kirkpatrick, Michael S., Maria Luisa Damiani, and Elisa Bertino. "Prox-RBAC." In the 19th ACM SIGSPATIAL International Conference. ACM Press, 2011. http://dx.doi.org/10.1145/2093973.2094018.
Full textBertino, Elisa, Barbara Catania, Maria Luisa Damiani, and Paolo Perlasca. "GEO-RBAC." In the tenth ACM symposium. ACM Press, 2005. http://dx.doi.org/10.1145/1063979.1063985.
Full textYouman, Charles E. "RBAC transition." In the first ACM Workshop. ACM Press, 1996. http://dx.doi.org/10.1145/270152.270160.
Full textKiviharju, Mikko. "RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies." In International Conference on Security and Cryptography. SCITEPRESS - Science and and Technology Publications, 2014. http://dx.doi.org/10.5220/0005122105000509.
Full textFerrara, Anna Lisa, Georg Fuchsbauer, and Bogdan Warinschi. "Cryptographically Enforced RBAC." In 2013 IEEE 26th Computer Security Foundations Symposium (CSF). IEEE, 2013. http://dx.doi.org/10.1109/csf.2013.15.
Full textCoyne, Edward J. "Prioritizing RBAC features." In the first ACM Workshop. ACM Press, 1996. http://dx.doi.org/10.1145/270152.270156.
Full textSandhu, Ravi. "Issues in RBAC." In the first ACM Workshop. ACM Press, 1996. http://dx.doi.org/10.1145/270152.270162.
Full textOuyang, Kai, and James B. D. Joshi. "CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time." In 2007 IEEE International Performance, Computing, and Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/pccc.2007.358928.
Full textFerreira, Ana, David Chadwick, Pedro Farinha, et al. "How to Securely Break into RBAC: The BTG-RBAC Model." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.12.
Full textBouchahda, Ahlem, Nhan Le Thanh, Adel Bouhoula, and Faten Labbene. "RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.30.
Full textReports on the topic "RBAC"
Hull, Julie, and Mark Markham. RBAC Driven Least Privilege Architecture For Control Systems. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1124080.
Full textKlasky, Hilda B., Sashi Tadinada, Paul T. Williams, and Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1093096.
Full textWinters, Paul, Benjamin Wakefield, Irene Toma, Anneke Schmider, Frini Chantzi, and Osman Dar. Facilitating progress towards SDG2: Zero Hunger. Royal Institute of International Affairs, 2022. http://dx.doi.org/10.55317/9781784135072.
Full textCelhay, Pablo, Sebastian Martinez, and Pedro Bernal. Is Results-Based Aid More Effective than Conventional Aid?: Evidence from the Health Sector in El Salvador. Inter-American Development Bank, 2018. http://dx.doi.org/10.18235/0011812.
Full textOu, Sivhuoch. A Rights-Based Approach to Development: A Cambodian Perspective. Cambodia Development Resource Institute, 2015. https://doi.org/10.64202/wp.101.201508.
Full textSamios N. P. RBRC Scientific Review Committee Meeting, Volume 101. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1093764.
Full textSamios, N. P. RBRC Scientific Review Committee Meeting, Volume 97. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/972031.
Full textORGANIZERS: OZAKI, S., and N. P. SAMIOS. PROCEEDINGS OF RIKEN BNL RESEARCH CENTER WORKSHOP: RBRC QCDOC COMPUTER DEDICATION AND SYMPOSIUM ON RBRC QCDOC (VOLUME 74). Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/15020005.
Full textEn'yo, Hideto, and Taku Izubuchi. RIKEN/RBRC Scientific Review Committee Meeting (Vol. 132). Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1524567.
Full textสุวัฑฒน, ดวงสมร, วีระพงศ์ โกยกุล та วิวัฒน์ ชวนะนิกุล. การศึกษาโครโมโซมในโคที่มีท่อปัสสาวะผิดปกติแต่กำเนิด. จุฬาลงกรณ์มหาวิทยาลัย, 2000. https://doi.org/10.58837/chula.res.2000.47.
Full text