Journal articles on the topic 'RBAC (Role-Based Access Control)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'RBAC (Role-Based Access Control).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Vinay Reddy Male. "Decoding Role-Based Access Control (RBAC)." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2082–90. https://doi.org/10.32628/cseit251112211.
Full textWang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.
Full textMuehlbacher, Joerg, and Christian Praher. "DS RBAC - Dynamic Sessions in Role Based Access Control." JUCS - Journal of Universal Computer Science 15, no. (3) (2009): 538–54. https://doi.org/10.3217/jucs-015-03-0538.
Full textM., Menaka, and Meenakshisundaram K. "10.11591/ijece.v8i5.pp3187-3193." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3187–93. https://doi.org/10.11591/ijece.v8i5.pp3187-3193.
Full textAbdulkadir, .A. Adamu* Dong Wang Abdul-Fatou Adam. "ACCESS CONTROL IN DISTRIBUTED HEALTHCARE INFORMATION: THE KEY FEATURES." Global Journal of Engineering Science and Research Management 4, no. 4 (2017): 53–58. https://doi.org/10.5281/zenodo.569969.
Full textSri, kanth Mandru. "Role-Based Access Control (RBAC) in Modern IAM Systems: A study on the effectiveness and challenges of RBAC in managing access to resources in large organizations." European Journal of Advances in Engineering and Technology 6, no. 4 (2019): 57–64. https://doi.org/10.5281/zenodo.13353634.
Full textRashid, Mamoon, and Er Rishma Chawla. "Securing Data Storage By Extending Role-Based Access Control." International Journal of Cloud Applications and Computing 3, no. 4 (2013): 28–37. http://dx.doi.org/10.4018/ijcac.2013100103.
Full textAftab, Muhammad Umar, Zhiguang Qin, Negalign Wake Hundera, et al. "Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model." Symmetry 11, no. 5 (2019): 669. http://dx.doi.org/10.3390/sym11050669.
Full textShanu Khare, Payal Thakur, Navjot Singh Talwandi, and Vikash Yadav. "Securing Microservice Architecture: Load Balancing and Role-Based Access Control." International Journal on Engineering Artificial Intelligence Management, Decision Support, and Policies 1, no. 1 (2024): 21–28. https://doi.org/10.63503/j.ijaimd.2024.7.
Full textMiguelangel, Trevino, and Al Lail Mustafa. "Database Web Application for Administering Spatio-Temporal Access Control Policies." American Journal of Advanced Research 5, no. 1 (2021): 6–12. https://doi.org/10.5281/zenodo.5112633.
Full textZhao, Yu Lan, and Chun Feng Jiang. "Research of Access Control Models in Personal Networks." Advanced Materials Research 989-994 (July 2014): 4751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4751.
Full textHuang, Dan Hua, and Ya Qian Yang. "Role-Based Risk Adaptive Access Control Model." Applied Mechanics and Materials 416-417 (September 2013): 1516–21. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1516.
Full textde Carvalho Junior, Marcelo Antonio, and Paulo Bandiera-Paiva. "Health Information System Role-Based Access Control Current Security Trends and Challenges." Journal of Healthcare Engineering 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/6510249.
Full textNyame, Gabriel, and Zhiguang Qin. "Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework." Information 11, no. 6 (2020): 334. http://dx.doi.org/10.3390/info11060334.
Full textTaresh Mehra. "The Critical Role of Role-Based Access Control (RBAC) in securing backup, recovery, and storage systems." International Journal of Science and Research Archive 13, no. 1 (2024): 1192–94. http://dx.doi.org/10.30574/ijsra.2024.13.1.1733.
Full textAbbdelkrim, Bouadjemi. "FORMAL DECISION MODELING FOR ROLE-BASED ACCESS CONTROL POLICIES." Advances in Mathematics: Scientific Journal 12, no. 3 (2023): 465–77. http://dx.doi.org/10.37418/amsj.12.3.4.
Full textZhao, Jiang Min, Jian Kang, and Tian Ge Li. "A Flexible Workflow Model of Role Based Access Control." Applied Mechanics and Materials 733 (February 2015): 784–87. http://dx.doi.org/10.4028/www.scientific.net/amm.733.784.
Full textMundbrod, Nicolas, and Manfred Reichert. "Object-Specific Role-Based Access Control." International Journal of Cooperative Information Systems 28, no. 01 (2019): 1950003. http://dx.doi.org/10.1142/s0218843019500035.
Full textMeneka, M., and K. Meenakshisundaram. "An Enhancement Role and Attribute Based Access Control Mechanism in Big Data." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3187. http://dx.doi.org/10.11591/ijece.v8i5.pp3187-3193.
Full textKUHLMANN, MIRCO, KARSTEN SOHR, and MARTIN GOGOLLA. "Employing UML and OCL for designing and analysing role-based access control." Mathematical Structures in Computer Science 23, no. 4 (2013): 796–833. http://dx.doi.org/10.1017/s0960129512000266.
Full textMpamugo, Ezichi, and Godwin Ansa. "Enhancing Network Security in Mobile Applications with Role-Based Access Control." Journal of Information Systems and Informatics 6, no. 3 (2024): 1872–99. http://dx.doi.org/10.51519/journalisi.v6i3.863.
Full textIshiaku, Awwal, and Christian Bassey. "Optimizing Synchronization and Role-Based Access Control in Double-Surgeon Telesurgery Cockpits." Journal of Internet Services and Information Security 15, no. 1 (2025): 330–47. https://doi.org/10.58346/jisis.2025.i1.021.
Full textGao, Lei, and Shu Lin Pan. "Fine-Grained Access Control Model Based on RBAC." Advanced Materials Research 468-471 (February 2012): 1667–70. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.1667.
Full textOwoade, Samuel, Denis Kisina, Oluwasanmi Segun Adanigbo, Abel Chukwuemeke Uzoka, Andrew Ifesinachi Daraojimba, and Toluwase Peter Gbenle. "Advances in Access Control Systems Using Policy-Driven and Role-Based Authorization Models." International Journal of Management and Organizational Research 2, no. 2 (2023): 128–34. https://doi.org/10.54660/ijmor.2023.2.2.128-134.
Full textEssien, Joe. "Enhancing Role - Based Access Control with Embedded Facial Recognition RBAC - EFR System." International Journal of Science and Research (IJSR) 12, no. 6 (2023): 2767–74. http://dx.doi.org/10.21275/sr23625003927.
Full textTsegaye, Tamir, and Stephen Flowerday. "A Clark-Wilson and ANSI role-based access control model." Information & Computer Security 28, no. 3 (2020): 373–95. http://dx.doi.org/10.1108/ics-08-2019-0100.
Full textWang, Tao, and Qiang Wu. "Role Minimization Optimization Algorithm Based on Concept Lattice Factor." Mathematics 11, no. 14 (2023): 3047. http://dx.doi.org/10.3390/math11143047.
Full textMarquis, Yewande Alice. "From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts." Journal of Engineering Research and Reports 26, no. 5 (2024): 138–54. http://dx.doi.org/10.9734/jerr/2024/v26i51141.
Full textDr., S. Subashree, M. Priya Dr., and Srividhya R. "Secure role-based access control with blockchain technology." International Journal of Advance Research in Multidisciplinary 2, no. 2 (2024): 204–10. https://doi.org/10.5281/zenodo.11514811.
Full textSabri, Khair Eddin. "An Algebraic Model to Analyze Role-Based Access Control Policies." Modern Applied Science 12, no. 10 (2018): 50. http://dx.doi.org/10.5539/mas.v12n10p50.
Full textArun Kumar Akuthota. "Role-Based Access Control (RBAC) in Modern Cloud Security Governance: An In-depth Analysis." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 3297–311. https://doi.org/10.32628/cseit25112793.
Full textM Sahyudi and Erliyan Redy Susanto. "Analisis Implementasi Sistem Keamanan Basis Data Berbasis Role-Based Access Control (RBAC) pada Aplikasi Enterprise Resource Planning." SATESI: Jurnal Sains Teknologi dan Sistem Informasi 5, no. 1 (2025): 105–16. https://doi.org/10.54259/satesi.v5i1.3997.
Full textCHAE, S. h. "uT-RBAC: Ubiquitous Role-Based Access Control Model." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 1 (2006): 238–39. http://dx.doi.org/10.1093/ietfec/e89-a.1.238.
Full textDoaa, Abdelfattah, A. Hassan Hesham, and A. Omara Fatma. "Enhancing highly-collaborative access control system using a new role-mapping algorithm." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (2022): 2765–82. https://doi.org/10.11591/ijece.v12i3.pp2765-2782.
Full textWar, War Myint, Phyu Phyu Mon Hlaing, Pa Win Pa, and Mar Naing Zin. "Bank's Roled Based Member Access Control." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1151–55. https://doi.org/10.5281/zenodo.3590567.
Full textDeng, Ji Qiu, Xiao Qing Luo, and Huang Ling Gu. "The Design and Implementation of G-RBAC Model in Map Permission." Advanced Materials Research 268-270 (July 2011): 1457–61. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1457.
Full textCharan Shankar Kummarapurugu. "Role-based access control in cloud-native applications: Evaluating best practices for secure multi-tenant Kubernetes environments." World Journal of Advanced Research and Reviews 1, no. 2 (2019): 045–53. http://dx.doi.org/10.30574/wjarr.2019.1.2.0008.
Full textMowla, Saleh, Niharika Sinha, Raghavendra Ganiga, and Nisha P. Shetty. "Trust Enhanced Role Based Access Control Using Genetic Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2018): 4724. http://dx.doi.org/10.11591/ijece.v8i6.pp4724-4734.
Full textMowla, Saleh, Niharika Sinha, Raghavendra Ganiga, and Nisha P. Shetty. "Trust Enhanced Role Based Access Control Using Genetic Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2018): 4724–34. https://doi.org/10.11591/ijece.v8i6.pp4724-4734.
Full textSinha, Akash Rakesh. "Fortifying Application Security: Integrating OAuth2 Single Sign-On with Precision Role-Based Access Control." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 11 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem8458.
Full textPenelova, Maria. "Hybrid Role and Attribute Based Access Control Applied in Information Systems." Cybernetics and Information Technologies 21, no. 3 (2021): 85–96. http://dx.doi.org/10.2478/cait-2021-0031.
Full textDia, Ousmane Amadou, and Csilla Farkas. "Business Driven User Role Assignment." International Journal of Information Security and Privacy 7, no. 1 (2013): 45–62. http://dx.doi.org/10.4018/jisp.2013010104.
Full textLi, Yunliang, Zhiqiang Du, Yanfang Fu, and Liangxin Liu. "Role-Based Access Control Model for Inter-System Cross-Domain in Multi-Domain Environment." Applied Sciences 12, no. 24 (2022): 13036. http://dx.doi.org/10.3390/app122413036.
Full textYastrebov, Ilia. "Role-Based Access Control for the Large Hadron Collider at CERN." International Journal of Computers Communications & Control 5, no. 3 (2010): 398. http://dx.doi.org/10.15837/ijccc.2010.3.2491.
Full textQin, Sheng Jun, and Ken E. Li. "The Research of Group Hierarchy Access Control in E-Government System." Advanced Materials Research 834-836 (October 2013): 1840–43. http://dx.doi.org/10.4028/www.scientific.net/amr.834-836.1840.
Full textHan, Gui Ying, and Xi Zuo Li. "The Implementation of Rights Management of Network Teaching Platform with Role-Based Access Control." Applied Mechanics and Materials 433-435 (October 2013): 1603–8. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1603.
Full textCruz, Jason Paul, Yuichi Kaji, and Naoto Yanai. "RBAC-SC: Role-Based Access Control Using Smart Contract." IEEE Access 6 (2018): 12240–51. http://dx.doi.org/10.1109/access.2018.2812844.
Full textPatil, Suraj Krishna, Sandipkumar Chandrakant Sagare, and Alankar Shantaram Shelar. "Use of Purpose and Role Based Access Control Mechanisms to Protect Data Within RDBMS." International Journal of Software Innovation 8, no. 1 (2020): 82–91. http://dx.doi.org/10.4018/ijsi.2020010105.
Full textArora, Amar, and Anjana Gosain. "Dynamic Trust Emergency Role-based Access Control (DTE-RBAC)." International Journal of Computer Applications 175, no. 24 (2020): 20–24. http://dx.doi.org/10.5120/ijca2020920773.
Full textFragkos, Georgios, Jay Johnson, and Eirini Eleni Tsiropoulou. "Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations." Energies 15, no. 17 (2022): 6375. http://dx.doi.org/10.3390/en15176375.
Full text