Academic literature on the topic 'RBAC (Role-Based Access Control)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RBAC (Role-Based Access Control).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "RBAC (Role-Based Access Control)"
Vinay Reddy Male. "Decoding Role-Based Access Control (RBAC)." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2082–90. https://doi.org/10.32628/cseit251112211.
Full textWang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.
Full textMuehlbacher, Joerg, and Christian Praher. "DS RBAC - Dynamic Sessions in Role Based Access Control." JUCS - Journal of Universal Computer Science 15, no. (3) (2009): 538–54. https://doi.org/10.3217/jucs-015-03-0538.
Full textM., Menaka, and Meenakshisundaram K. "10.11591/ijece.v8i5.pp3187-3193." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3187–93. https://doi.org/10.11591/ijece.v8i5.pp3187-3193.
Full textAbdulkadir, .A. Adamu* Dong Wang Abdul-Fatou Adam. "ACCESS CONTROL IN DISTRIBUTED HEALTHCARE INFORMATION: THE KEY FEATURES." Global Journal of Engineering Science and Research Management 4, no. 4 (2017): 53–58. https://doi.org/10.5281/zenodo.569969.
Full textSri, kanth Mandru. "Role-Based Access Control (RBAC) in Modern IAM Systems: A study on the effectiveness and challenges of RBAC in managing access to resources in large organizations." European Journal of Advances in Engineering and Technology 6, no. 4 (2019): 57–64. https://doi.org/10.5281/zenodo.13353634.
Full textRashid, Mamoon, and Er Rishma Chawla. "Securing Data Storage By Extending Role-Based Access Control." International Journal of Cloud Applications and Computing 3, no. 4 (2013): 28–37. http://dx.doi.org/10.4018/ijcac.2013100103.
Full textAftab, Muhammad Umar, Zhiguang Qin, Negalign Wake Hundera, et al. "Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model." Symmetry 11, no. 5 (2019): 669. http://dx.doi.org/10.3390/sym11050669.
Full textShanu Khare, Payal Thakur, Navjot Singh Talwandi, and Vikash Yadav. "Securing Microservice Architecture: Load Balancing and Role-Based Access Control." International Journal on Engineering Artificial Intelligence Management, Decision Support, and Policies 1, no. 1 (2024): 21–28. https://doi.org/10.63503/j.ijaimd.2024.7.
Full textMiguelangel, Trevino, and Al Lail Mustafa. "Database Web Application for Administering Spatio-Temporal Access Control Policies." American Journal of Advanced Research 5, no. 1 (2021): 6–12. https://doi.org/10.5281/zenodo.5112633.
Full textDissertations / Theses on the topic "RBAC (Role-Based Access Control)"
Khayat, Etienne J. "Role-based access control (RBAC) : formal modelling and risk-based administration." Thesis, London South Bank University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435233.
Full textSingh, Arundhati 1978. "SIREN : a SQL-based implementation of role-based access control (RBAC) for enterprise networks." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87870.
Full textFalkcrona, Jerry. "Role-based access control and single sign-on for Web services." Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11224.
Full textSubedi, Harendra. "Mathematical Modelling of Delegation in Role Based Access Control." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381.
Full textManning, Francis Jay. "A Framework for Enforcing Role Based Access Control in Open Source Software." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/228.
Full textRondinini, Giorgia. "Role-Based Access Control in ambienti cloud multi-region." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textGunnarsson, Peter. "Role based access control in a telecommunications operations and maintenance network." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2875.
Full textShi, Wei, and wshi2001@yahoo com au. "An Extended Role-based Access Control Model for Enterprise Systems and Web Services." RMIT University. Computer Science and Information Technology, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.122429.
Full textPoe, Gary A. "Privacy in Database Designs: A Role Based Approach." Scholar Commons, 2007. https://scholarcommons.usf.edu/etd/454.
Full textWang, Hua. "Access management in electronic commerce system." University of Southern Queensland, Faculty of Sciences, 2004. http://eprints.usq.edu.au/archive/00001522/.
Full textBooks on the topic "RBAC (Role-Based Access Control)"
National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control., Association for Computing Machinery. Washington, D.C. Chapter., National Institute of Standards and Technology (U.S.), and George Mason University, eds. Proceedings, Fourth ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, October 28-29, 1999. ACM, 1999.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control. and Technische Universität Berlin, eds. Proceedings, Fifth ACM Workshop on Role-Based Access Control: Berlin, Germany, July 26-27, 2000. ACM, 2000.
Find full textACM, Workshop on Role-Based Access Control (3rd 1998 Fairfax Va ). Proceedings: Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 22-23, 1998. ACM, 1998.
Find full textBook chapters on the topic "RBAC (Role-Based Access Control)"
Carruthers, Andrew. "Role-Based Access Control (RBAC)." In Building the Snowflake Data Cloud. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8593-0_5.
Full textJagadeesan, Radha, Alan Jeffrey, Corin Pitcher, and James Riely. "λ-RBAC: Programming with Role-Based Access Control." In Automata, Languages and Programming. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11787006_39.
Full textXu, Zhen, Dengguo Feng, Lan Li, and Hua Chen. "UC-RBAC: A Usage Constrained Role-Based Access Control Model." In Information and Communications Security. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39927-8_31.
Full textJafari, Mohammad, and Mohammad Fathian. "Management Advantages of Object Classification in Role-Based Access Control (RBAC)." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-76929-3_11.
Full textGofman, Mikhail I., Ruiqi Luo, Ayla C. Solomon, Yingbin Zhang, Ping Yang, and Scott D. Stoller. "RBAC-PAT: A Policy Analysis Tool for Role Based Access Control." In Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00768-2_4.
Full textOh, Sejong, and Seog Park. "Task-Role Based Access Control (T-RBAC): An Improved Access Control Model for Enterprise Environment." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44469-6_25.
Full textXu, Zhiyu, Tengyun Jiao, Lin Yang, Donghai Liu, Sheng Wen, and Yang Xiang. "RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38991-8_29.
Full textQiang, Weizhong, Hai Jin, Xuanhua Shi, Deqing Zou, and Hao Zhang. "RB-GACA: A RBAC Based Grid Access Control Architecture." In Grid and Cooperative Computing. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24679-4_91.
Full textGuo, He, Guoji Lu, Yuxin Wang, Han Li, and Xin Chen. "RBAC-Based Access Control Integration Framework for Legacy System." In Web Information Systems and Mining. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16515-3_25.
Full textKang, Jang-Mook, Jae-Sang Cha, You-Jin Song, et al. "A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control)." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23141-4_39.
Full textConference papers on the topic "RBAC (Role-Based Access Control)"
Umamageswaran, J., Anish Shivakumar, Achanta Srinivas Varshith, and Prabu M. "Developing a More Adaptive and Dynamic Trust Evaluation System Using a Task Role Based Access Control Module (T-RBAC)." In 2025 International Conference on Data Science and Business Systems (ICDSBS). IEEE, 2025. https://doi.org/10.1109/icdsbs63635.2025.11031714.
Full textSaffarian, Mohsen, and Babak Sadighi. "Owner-Based Role-Based Access Control OB-RBAC." In 2010 International Conference on Availability, Reliability, and Security (ARES). IEEE, 2010. http://dx.doi.org/10.1109/ares.2010.94.
Full textGunti, N., Weiqing Sun, and M. Niamat. "I-RBAC: Isolation enabled role-based access control." In 2011 Ninth Annual International Conference on Privacy, Security and Trust. IEEE, 2011. http://dx.doi.org/10.1109/pst.2011.5971967.
Full textTripunitara, Mahesh V., and Bogdan Carbunar. "Efficient access enforcement in distributed role-based access control (RBAC) deployments." In the 14th ACM symposium. ACM Press, 2009. http://dx.doi.org/10.1145/1542207.1542232.
Full textBammigatti, Prasanna H., and Dr P. R. Rao. "GenericWA-RBAC: Role Based Access Control Model for Web Applications." In 9th International Conference on Information Technology (ICIT'06). IEEE, 2006. http://dx.doi.org/10.1109/icit.2006.57.
Full textWang, Jin, Qiang Li, and Daxing Li. "I-RBAC: An Identity& Role Based Access Control Model." In 2007 IEEE International Conference on Control and Automation. IEEE, 2007. http://dx.doi.org/10.1109/icca.2007.4376922.
Full textZhou, Yanjie, and Min Wen. "A Novel Role-Based-Access-Control(RBAC) Framework and Application." In International Conference on Education, Management and Computing Technology (ICEMCT-15). Atlantis Press, 2015. http://dx.doi.org/10.2991/icemct-15.2015.43.
Full textCao, Rongning. "Research on RBAC Based Role Access Control in Financial MIS." In 2022 6th International Conference on Wireless Communications and Applications (ICWCAPP). IEEE, 2022. http://dx.doi.org/10.1109/icwcapp57292.2022.00043.
Full textBouchahda, Ahlem, Nhan Le Thanh, Adel Bouhoula, and Faten Labbene. "RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.30.
Full textZarnett, Jeff, Mahesh Tripunitara, and Patrick Lam. "Role-based access control (RBAC) in Java via proxy objects using annotations." In Proceeding of the 15th ACM symposium. ACM Press, 2010. http://dx.doi.org/10.1145/1809842.1809858.
Full textReports on the topic "RBAC (Role-Based Access Control)"
Klasky, Hilda B., Sashi Tadinada, Paul T. Williams, and Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1093096.
Full textJansen, W. A. A revised model for role-based access control. National Institute of Standards and Technology, 1998. http://dx.doi.org/10.6028/nist.ir.6192.
Full textFreudenthal, Eric, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti. DRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada440599.
Full textShah, Arpan P. Scalable Authorization in Role-Based Access Control Using Negative Permissions and Remote Authorization. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada460113.
Full textPoole, Joseph, John Barkley, Kevin Brady, Anthony Cincotta, and Wayne Salamon. Distributed communication methods and role-based access control for use in health care applications. National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.ir.5820.
Full textMacedo Junior, Ronaldo Porto, Clarissa Piterman Gross, Fabrizio Cafaggi, et al. Accessing the Global Value Chain in a Changing Institutional Environment: Comparing Aeronautics and Coffee. Inter-American Development Bank, 2012. http://dx.doi.org/10.18235/0011454.
Full textMartinez, Hector, Kylie Rochford, and Diane Bergeron. Helping You, Helping Me? The Mediating Role of Organizational Citizenship Behavior in the Relationship Between Psychological Capital and Social Network Positions. Center for Creative Leadership, 2025. https://doi.org/10.35613/ccl.2025.2061.
Full textQian, Yuping, Yangjun Zhang, and WEILIN ZHUGE. Key Technology Challenges of Electric Ducted Fan Propulsion Systems for eVTOL. SAE International, 2023. http://dx.doi.org/10.4271/epr2023027.
Full textAng, Len, and Sokphea Young. Civil Society Organisations and Youth Civic Engagement in Cambodia. Cambodia Development Resource Institute, 2021. https://doi.org/10.64202/wp.132.202110.
Full text