Academic literature on the topic 'RBAC (Role-Based Access Control)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RBAC (Role-Based Access Control).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "RBAC (Role-Based Access Control)"

1

Vinay Reddy Male. "Decoding Role-Based Access Control (RBAC)." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2082–90. https://doi.org/10.32628/cseit251112211.

Full text
Abstract:
This article provides a comprehensive examination of Role-Based Access Control (RBAC) and its significance in modern cybersecurity, particularly within cloud environments. It explores the fundamental concepts of RBAC, including its core principle of assigning access rights based on organizational roles rather than individual users. The article delves into the implementation process, discussing role definition, permission assignment, and user-role association. It highlights the key advantages of RBAC, such as simplified permission management, enhanced security through the principle of least pri
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.

Full text
Abstract:
The normal role-based access control (RBAC) model decouples users and permissions through roles,and different software systems have different implementation syteles.The paper proposes an engine model which can configure the RBAC management systems flexibly.It is a configuration tool to generate different RBAC management systems which meet different users’ requirements. The practice proves that the engine model can improve the efficiency and quality of software development. The role-based access control model decouples users and permissions through roles in order to simplify authorized operatio
APA, Harvard, Vancouver, ISO, and other styles
3

Muehlbacher, Joerg, and Christian Praher. "DS RBAC - Dynamic Sessions in Role Based Access Control." JUCS - Journal of Universal Computer Science 15, no. (3) (2009): 538–54. https://doi.org/10.3217/jucs-015-03-0538.

Full text
Abstract:
Besides the well established access control models, Discretionary Access Control (DAC) and Mandatory Access Control (MAC), the policy neutral Role Based Access Control (RBAC) is gaining increasingly momentum. An important step towards a wide acceptance of RBAC has been achieved by the standardization of RBAC through the American National Standards Institute (ANSI) in 2004. While the concept of sessions specified in the ANSI RBAC standard allows for differentiated role selections according to tasks that have to be performed by users, it is very likely that more roles will be activated in a sess
APA, Harvard, Vancouver, ISO, and other styles
4

M., Menaka, and Meenakshisundaram K. "10.11591/ijece.v8i5.pp3187-3193." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3187–93. https://doi.org/10.11591/ijece.v8i5.pp3187-3193.

Full text
Abstract:
To be able to leverage big data to achieve enhanced strategic insight and make informed decision, an efficient access control mechanism is needed for ensuring end to end security of such information asset. Attribute Based Access Control (ABAC), Role Based Access Control (RBAC) and Event Based Access Control (EBAC) are widely used access control mechanisms. The ABAC system is much more complex in terms of policy reviews, hence analyzing the policy and reviewing or changing user permission are quite complex task. RBAC system is labor intensive and time consuming to build a model instance and it
APA, Harvard, Vancouver, ISO, and other styles
5

Abdulkadir, .A. Adamu* Dong Wang Abdul-Fatou Adam. "ACCESS CONTROL IN DISTRIBUTED HEALTHCARE INFORMATION: THE KEY FEATURES." Global Journal of Engineering Science and Research Management 4, no. 4 (2017): 53–58. https://doi.org/10.5281/zenodo.569969.

Full text
Abstract:
Information and communication technologies (ICTs) today provide ubiquitous possibilities to share electronic patient’s data across several healthcare organizations and hospital departments. Data security is therefore a strong requirement to ensure compliance with confidentiality and privacy rule of medical records. However, access control mechanism in Nigeria’s health information systems do not sufficiently guarantee managed access, data and resource protection. To conquer the problems existing in the current access control mechanism available to University of Abuja Teaching Hospital (UATH), N
APA, Harvard, Vancouver, ISO, and other styles
6

Sri, kanth Mandru. "Role-Based Access Control (RBAC) in Modern IAM Systems: A study on the effectiveness and challenges of RBAC in managing access to resources in large organizations." European Journal of Advances in Engineering and Technology 6, no. 4 (2019): 57–64. https://doi.org/10.5281/zenodo.13353634.

Full text
Abstract:
Modern Identity and Access Management, IAM, solutions designed for today’s organizations cannot be complete without considering RBAC, particularly for large organizations. This paper aims to review the computational results of employing RBAC to enhance the security features and reduce the level of administrative cost, as well as weigh the advantages and disadvantages of this resource access management system. RBAC ensures compliance with the organizational requirements and brings simplicity to access control through the formation of roles that come with certain privileges. However, it is
APA, Harvard, Vancouver, ISO, and other styles
7

Rashid, Mamoon, and Er Rishma Chawla. "Securing Data Storage By Extending Role-Based Access Control." International Journal of Cloud Applications and Computing 3, no. 4 (2013): 28–37. http://dx.doi.org/10.4018/ijcac.2013100103.

Full text
Abstract:
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, the authors highlight the drawbacks of RBAC models in terms of access control and authorization and later provide a more viable extended-RBAC model, which enhances and extends its powers to make any Cloud Server more secure by adding valuable constraints. Later the Blobs are stored on cloud server which is then accessed b
APA, Harvard, Vancouver, ISO, and other styles
8

Aftab, Muhammad Umar, Zhiguang Qin, Negalign Wake Hundera, et al. "Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model." Symmetry 11, no. 5 (2019): 669. http://dx.doi.org/10.3390/sym11050669.

Full text
Abstract:
A major development in the field of access control is the dominant role-based access control (RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the concept of roles. In addition, attribute-based access control (ABAC) is added to the access control models, which is famous for its dynamic behavior. Separation of duty (SOD) is used for enforcing least privilege concept in RBAC and ABAC. Moreover, SOD is a powerful tool that is used to protect an organization from internal security attacks and threats. Different problems have been found in the implementation of SOD at
APA, Harvard, Vancouver, ISO, and other styles
9

Shanu Khare, Payal Thakur, Navjot Singh Talwandi, and Vikash Yadav. "Securing Microservice Architecture: Load Balancing and Role-Based Access Control." International Journal on Engineering Artificial Intelligence Management, Decision Support, and Policies 1, no. 1 (2024): 21–28. https://doi.org/10.63503/j.ijaimd.2024.7.

Full text
Abstract:
This study focuses on the security aspects within microservice architecture, particularly addressing load balancing and role-based access control (RBAC). Exploring the intersection of load balancing techniques and RBAC mechanisms, the research aims to enhance the security posture of microservices. By evalu-ating strategies for efficient load distribution and implementing RBAC proto-cols, the study seeks to fortify the architecture against potential vulnerabili-ties. The integration of load balancing and RBAC not only ensures optimized resource utilization but also strengthens access control me
APA, Harvard, Vancouver, ISO, and other styles
10

Miguelangel, Trevino, and Al Lail Mustafa. "Database Web Application for Administering Spatio-Temporal Access Control Policies." American Journal of Advanced Research 5, no. 1 (2021): 6–12. https://doi.org/10.5281/zenodo.5112633.

Full text
Abstract:
Governmental and business organizations use the standard authorization model─ Role-based access control (RBAC) ─ to specify and administer access policies for electronic resources. In RBAC-based applications, access is granted or denied based on users’ credentials. However, the RBAC model lacks features that allow applications to determine access based on time and location, spatio-temporal information. This access requirement is important for a growing number of mobile applications. Researchers have proposed new access control models to accommodate organizations' reliance on mobile a
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "RBAC (Role-Based Access Control)"

1

Khayat, Etienne J. "Role-based access control (RBAC) : formal modelling and risk-based administration." Thesis, London South Bank University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Arundhati 1978. "SIREN : a SQL-based implementation of role-based access control (RBAC) for enterprise networks." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87870.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.<br>Includes bibliographical references (leaves 69-71).<br>by Arundhati Singh.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
3

Falkcrona, Jerry. "Role-based access control and single sign-on for Web services." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11224.

Full text
Abstract:
<p>Nowadays, the need for sharing information between different systems in a secure manner is common, not only in the corporate world but also in the military world. This information often resides at different locations, creating a distributed system. In order to share information in a secure manner in a distributed system, credentials are often used to attain authorization.</p><p>This thesis examines how such a distributed system for sharing information can be realized, using the technology readily available today. Accounting to the results of this examination a basic system is implemented, a
APA, Harvard, Vancouver, ISO, and other styles
4

Subedi, Harendra. "Mathematical Modelling of Delegation in Role Based Access Control." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381.

Full text
Abstract:
One of the most widespread access control model that assigns permissions to a user is Role Based Access Control (RBAC). The basic idea is to limit the access to resources by using the indirection of roles, which are associated both to users and permissions. There has been research conducted with respect to clarifying RBAC and its components, as well as in creating mathematical models describing different aspects of its administrative issues in RBAC. But, till date no work has been done in terms of formalization (Mathematical Modelling) of delegation and revocation of roles in RBAC. Which provi
APA, Harvard, Vancouver, ISO, and other styles
5

Manning, Francis Jay. "A Framework for Enforcing Role Based Access Control in Open Source Software." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/228.

Full text
Abstract:
While Role Based Access Control (RBAC) has been a popular topic of research over the last several years, there are some gaps in the literature that have been waiting to be addressed. One of these gaps involves the application of RBAC to free and open source software (FOSS). With the prevalence of FOSS in most information systems growing rapidly, there is a need to be able to provide a level of confidence that the software will not compromise the data integrity of an environment, nor will it enable the violation of established access controls. Additionally, when utilizing FOSS software it is de
APA, Harvard, Vancouver, ISO, and other styles
6

Rondinini, Giorgia. "Role-Based Access Control in ambienti cloud multi-region." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
Negli ultimi anni si è assistito a un incremento dell'uso del cloud, con cambiamenti nel tipo di servizi distribuiti tramite esso e nel tipo di infrastruttura utilizzata per supportare tali servizi. Il comprensibile desiderio di migliorare i servizi offerti, diminuendo però i costi di gestione e manutenzione, sta portando infatti all'utilizzo di infrastrutture cloud eterogenee, spesso distribuite su più aree geografiche. Tale eterogeneità delle infrastrutture rende complicato garantire la sicurezza dei sistemi, in un mondo in cui gli attacchi informatici sono sempre più diffusi ed è sempre più
APA, Harvard, Vancouver, ISO, and other styles
7

Gunnarsson, Peter. "Role based access control in a telecommunications operations and maintenance network." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2875.

Full text
Abstract:
<p>Ericsson develops and builds mobile telecommunication networks. These networks consists of a large number of equipment. Each telecommunication company has a staff of administrators appointed to manage respective networks. </p><p>In this thesis, we investigate the requirements for an access control model to manage the large number of permissions and equipment in telecommunication networks. Moreover, we show that the existing models do not satisfy the identified requirements. Therefore, we propose a novel RBAC model which is adapted for these conditions. </p><p>We also investigate some of the
APA, Harvard, Vancouver, ISO, and other styles
8

Shi, Wei, and wshi2001@yahoo com au. "An Extended Role-based Access Control Model for Enterprise Systems and Web Services." RMIT University. Computer Science and Information Technology, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.122429.

Full text
Abstract:
This thesis intends to develop application-level access control models to address several major security issues in enterprise environments. The first goal is to provide simple and efficient authorization specifications to reduce the complexity of security management. The second goal is to provide dynamic access control for Web service applications. The third goal is to provide an access control framework for Semantic Web services. In this thesis, an Authorization-Function-Based Role-based Access Control (FB-RBAC) model is proposed for controlling enterprise systems at the applicati
APA, Harvard, Vancouver, ISO, and other styles
9

Poe, Gary A. "Privacy in Database Designs: A Role Based Approach." Scholar Commons, 2007. https://scholarcommons.usf.edu/etd/454.

Full text
Abstract:
Privacy concerns have always been present in every society. The introduction of information technology information has enabled a reduction in the cost of gathering information, management of that information and the permitted that same information to become increasingly portable. Coupled with these reductions of cost has been an increase in the demand for information as well as the concern that privacy expectations be respected and enforced through security systems that safeguard access to private-type data. Security systems enforce privacy expectations. Unfortunately there is no consensus on
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Hua. "Access management in electronic commerce system." University of Southern Queensland, Faculty of Sciences, 2004. http://eprints.usq.edu.au/archive/00001522/.

Full text
Abstract:
The definition of Electronic commerce is the use of electronic transmission mediums to engage in the exchange, including buying and selling, of products and services requiring transportation, either physically or digitally, from location to location. Electronic commerce systems, including mobile e-commerce, are widely used since 1990. The number of world-wide Internet users tripled between 1993 and 1995 to 60 million, and by 2000 there were 250 million users. More than one hundred countries have Internet access. Electronic commerce, especial mobile e-commerce systems, allows their users to acc
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "RBAC (Role-Based Access Control)"

1

Ferraiolo, David. Role-based access control. 2nd ed. Artech House, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ferraiolo, David. Role-based access controls. Artech House, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., Association for Computing Machinery. Washington, D.C. Chapter., National Institute of Standards and Technology (U.S.), and George Mason University, eds. Proceedings, Fourth ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, October 28-29, 1999. ACM, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control. and Technische Universität Berlin, eds. Proceedings, Fifth ACM Workshop on Role-Based Access Control: Berlin, Germany, July 26-27, 2000. ACM, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

ACM, Workshop on Role-Based Access Control (3rd 1998 Fairfax Va ). Proceedings: Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 22-23, 1998. ACM, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "RBAC (Role-Based Access Control)"

1

Carruthers, Andrew. "Role-Based Access Control (RBAC)." In Building the Snowflake Data Cloud. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8593-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jagadeesan, Radha, Alan Jeffrey, Corin Pitcher, and James Riely. "λ-RBAC: Programming with Role-Based Access Control." In Automata, Languages and Programming. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11787006_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xu, Zhen, Dengguo Feng, Lan Li, and Hua Chen. "UC-RBAC: A Usage Constrained Role-Based Access Control Model." In Information and Communications Security. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39927-8_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jafari, Mohammad, and Mohammad Fathian. "Management Advantages of Object Classification in Role-Based Access Control (RBAC)." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-76929-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gofman, Mikhail I., Ruiqi Luo, Ayla C. Solomon, Yingbin Zhang, Ping Yang, and Scott D. Stoller. "RBAC-PAT: A Policy Analysis Tool for Role Based Access Control." In Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00768-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Oh, Sejong, and Seog Park. "Task-Role Based Access Control (T-RBAC): An Improved Access Control Model for Enterprise Environment." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44469-6_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Zhiyu, Tengyun Jiao, Lin Yang, Donghai Liu, Sheng Wen, and Yang Xiang. "RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38991-8_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Qiang, Weizhong, Hai Jin, Xuanhua Shi, Deqing Zou, and Hao Zhang. "RB-GACA: A RBAC Based Grid Access Control Architecture." In Grid and Cooperative Computing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24679-4_91.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Guo, He, Guoji Lu, Yuxin Wang, Han Li, and Xin Chen. "RBAC-Based Access Control Integration Framework for Legacy System." In Web Information Systems and Mining. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16515-3_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kang, Jang-Mook, Jae-Sang Cha, You-Jin Song, et al. "A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control)." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23141-4_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "RBAC (Role-Based Access Control)"

1

Umamageswaran, J., Anish Shivakumar, Achanta Srinivas Varshith, and Prabu M. "Developing a More Adaptive and Dynamic Trust Evaluation System Using a Task Role Based Access Control Module (T-RBAC)." In 2025 International Conference on Data Science and Business Systems (ICDSBS). IEEE, 2025. https://doi.org/10.1109/icdsbs63635.2025.11031714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saffarian, Mohsen, and Babak Sadighi. "Owner-Based Role-Based Access Control OB-RBAC." In 2010 International Conference on Availability, Reliability, and Security (ARES). IEEE, 2010. http://dx.doi.org/10.1109/ares.2010.94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gunti, N., Weiqing Sun, and M. Niamat. "I-RBAC: Isolation enabled role-based access control." In 2011 Ninth Annual International Conference on Privacy, Security and Trust. IEEE, 2011. http://dx.doi.org/10.1109/pst.2011.5971967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tripunitara, Mahesh V., and Bogdan Carbunar. "Efficient access enforcement in distributed role-based access control (RBAC) deployments." In the 14th ACM symposium. ACM Press, 2009. http://dx.doi.org/10.1145/1542207.1542232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bammigatti, Prasanna H., and Dr P. R. Rao. "GenericWA-RBAC: Role Based Access Control Model for Web Applications." In 9th International Conference on Information Technology (ICIT'06). IEEE, 2006. http://dx.doi.org/10.1109/icit.2006.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Jin, Qiang Li, and Daxing Li. "I-RBAC: An Identity& Role Based Access Control Model." In 2007 IEEE International Conference on Control and Automation. IEEE, 2007. http://dx.doi.org/10.1109/icca.2007.4376922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Yanjie, and Min Wen. "A Novel Role-Based-Access-Control(RBAC) Framework and Application." In International Conference on Education, Management and Computing Technology (ICEMCT-15). Atlantis Press, 2015. http://dx.doi.org/10.2991/icemct-15.2015.43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cao, Rongning. "Research on RBAC Based Role Access Control in Financial MIS." In 2022 6th International Conference on Wireless Communications and Applications (ICWCAPP). IEEE, 2022. http://dx.doi.org/10.1109/icwcapp57292.2022.00043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bouchahda, Ahlem, Nhan Le Thanh, Adel Bouhoula, and Faten Labbene. "RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zarnett, Jeff, Mahesh Tripunitara, and Patrick Lam. "Role-based access control (RBAC) in Java via proxy objects using annotations." In Proceeding of the 15th ACM symposium. ACM Press, 2010. http://dx.doi.org/10.1145/1809842.1809858.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "RBAC (Role-Based Access Control)"

1

Klasky, Hilda B., Sashi Tadinada, Paul T. Williams, and Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1093096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jansen, W. A. A revised model for role-based access control. National Institute of Standards and Technology, 1998. http://dx.doi.org/10.6028/nist.ir.6192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Freudenthal, Eric, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti. DRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada440599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shah, Arpan P. Scalable Authorization in Role-Based Access Control Using Negative Permissions and Remote Authorization. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada460113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Poole, Joseph, John Barkley, Kevin Brady, Anthony Cincotta, and Wayne Salamon. Distributed communication methods and role-based access control for use in health care applications. National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.ir.5820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Macedo Junior, Ronaldo Porto, Clarissa Piterman Gross, Fabrizio Cafaggi, et al. Accessing the Global Value Chain in a Changing Institutional Environment: Comparing Aeronautics and Coffee. Inter-American Development Bank, 2012. http://dx.doi.org/10.18235/0011454.

Full text
Abstract:
The aim of the paper, based on empirical research in Brazil, is to investigate how supply chains have evolved over time, what factors have driven this evolution and also how a specific set of contractual practices along these chains is linked to access to international markets. The two selected case studies in the field of agriculture and aeronautics permit comparison between different modes of accessing international markets and GVCs; they illustrate the roles of transnational corporations and those of public institutions both at domestic and international levels in promoting access and deter
APA, Harvard, Vancouver, ISO, and other styles
7

Martinez, Hector, Kylie Rochford, and Diane Bergeron. Helping You, Helping Me? The Mediating Role of Organizational Citizenship Behavior in the Relationship Between Psychological Capital and Social Network Positions. Center for Creative Leadership, 2025. https://doi.org/10.35613/ccl.2025.2061.

Full text
Abstract:
Over the past few decades, there has been an increasing shift from focusing on what is wrong with humans and organizations (e.g., problems, maladaptive behavior) to focusing on what is right (e.g., strengths, human and organizational flourishing). In this positive vein, we investigated the explanatory role of organizational citizenship behavior (e.g., helping others, volunteering for tasks that help the group or organization, organizing events, speaking up with ideas) in examining the relationship between psychological capital and social network positions. Psychological capital is an individua
APA, Harvard, Vancouver, ISO, and other styles
8

Qian, Yuping, Yangjun Zhang, and WEILIN ZHUGE. Key Technology Challenges of Electric Ducted Fan Propulsion Systems for eVTOL. SAE International, 2023. http://dx.doi.org/10.4271/epr2023027.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Electrical vertical takeoff and landing (eVTOL) vehicles for urban air mobility (UAM) are garnering increased attention from both the automotive and aerospace industries, with use cases ranging from individual transportation, public service, cargo delivery, and more. Distributed electric propulsion systems are their main technical feature; they determine vehicle size and propulsion efficiency and provide distributed thrust to achieve attitude control. Considering the intended role of eVTOL vehicles, ducted-fan systems ar
APA, Harvard, Vancouver, ISO, and other styles
9

Ang, Len, and Sokphea Young. Civil Society Organisations and Youth Civic Engagement in Cambodia. Cambodia Development Resource Institute, 2021. https://doi.org/10.64202/wp.132.202110.

Full text
Abstract:
Civic engagement is “how citizens participate in the life of a community to improve conditions for others or to help shape the community’s future” (Adler and Goggin 2005, p. 236). In Cambodia, civic engagement has been promoted by civil society organisations (CSOs) since 1993. The organisations covered by the abbreviation “CSO” are many in Cambodia, but they consist of, and are not limited to, non-governmental organisations (NGOs), youth associations, community-based organisations (CBOs), self-help groups and small clubs. There are around 3,000 NGOs registered officially with the Ministry of I
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!