Journal articles on the topic 'RBAC'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'RBAC.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.
Full textEditorial Office, OBM Integrative and Complementary Medicine. "An Interview with Dr. Sok Cheon Pak." OBM Integrative and Complementary Medicine 07, no. 03 (2022): 1–4. http://dx.doi.org/10.21926/obm.icm.2203043.
Full textMarquis, Yewande Alice. "From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts." Journal of Engineering Research and Reports 26, no. 5 (2024): 138–54. http://dx.doi.org/10.9734/jerr/2024/v26i51141.
Full textM Sahyudi and Erliyan Redy Susanto. "Analisis Implementasi Sistem Keamanan Basis Data Berbasis Role-Based Access Control (RBAC) pada Aplikasi Enterprise Resource Planning." SATESI: Jurnal Sains Teknologi dan Sistem Informasi 5, no. 1 (2025): 105–16. https://doi.org/10.54259/satesi.v5i1.3997.
Full textNyame, Gabriel, and Zhiguang Qin. "Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework." Information 11, no. 6 (2020): 334. http://dx.doi.org/10.3390/info11060334.
Full textOoi, Soo Liang, Peter S. Micalos, and Sok Cheon Pak. "Modified Rice Bran Arabinoxylan by Lentinus edodes Mycelial Enzyme as an Immunoceutical for Health and Aging—A Comprehensive Literature Review." Molecules 28, no. 17 (2023): 6313. http://dx.doi.org/10.3390/molecules28176313.
Full textOoi, Soo Liang, Sok Cheon Pak, Peter S. Micalos, et al. "The Health-Promoting Properties and Clinical Applications of Rice Bran Arabinoxylan Modified with Shiitake Mushroom Enzyme—A Narrative Review." Molecules 26, no. 9 (2021): 2539. http://dx.doi.org/10.3390/molecules26092539.
Full textLewis, John E., Steven E. Atlas, Oscar L. Higuera, et al. "The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease." Evidence-Based Complementary and Alternative Medicine 2018 (May 3, 2018): 1–10. http://dx.doi.org/10.1155/2018/1751583.
Full textde Carvalho Junior, Marcelo Antonio, and Paulo Bandiera-Paiva. "Health Information System Role-Based Access Control Current Security Trends and Challenges." Journal of Healthcare Engineering 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/6510249.
Full textMitra, Barsha, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri. "Migrating from RBAC to temporal RBAC." IET Information Security 11, no. 5 (2017): 294–300. http://dx.doi.org/10.1049/iet-ifs.2016.0258.
Full textDarwish, Wesam, and Konstantin Beznosov. "Analysis of ANSI RBAC Support in EJB." International Journal of Secure Software Engineering 2, no. 2 (2011): 25–52. http://dx.doi.org/10.4018/jsse.2011040102.
Full textZhang, Jian Hua, and Qiang Liu. "An Administration Iteration Problem and its Solution when Deploying the RBAC Model." Applied Mechanics and Materials 263-266 (December 2012): 1584–87. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1584.
Full textZhao, Yu Lan, and Chun Feng Jiang. "Research of Access Control Models in Personal Networks." Advanced Materials Research 989-994 (July 2014): 4751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4751.
Full textLewis, John E., Steven E. Atlas, Oscar L. Higuera, et al. "Corrigendum to “The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease”." Evidence-Based Complementary and Alternative Medicine 2020 (April 7, 2020): 1–10. http://dx.doi.org/10.1155/2020/9575878.
Full textSri, kanth Mandru. "Role-Based Access Control (RBAC) in Modern IAM Systems: A study on the effectiveness and challenges of RBAC in managing access to resources in large organizations." European Journal of Advances in Engineering and Technology 6, no. 4 (2019): 57–64. https://doi.org/10.5281/zenodo.13353634.
Full textShanu Khare, Payal Thakur, Navjot Singh Talwandi, and Vikash Yadav. "Securing Microservice Architecture: Load Balancing and Role-Based Access Control." International Journal on Engineering Artificial Intelligence Management, Decision Support, and Policies 1, no. 1 (2024): 21–28. https://doi.org/10.63503/j.ijaimd.2024.7.
Full textTaresh Mehra. "The Critical Role of Role-Based Access Control (RBAC) in securing backup, recovery, and storage systems." International Journal of Science and Research Archive 13, no. 1 (2024): 1192–94. http://dx.doi.org/10.30574/ijsra.2024.13.1.1733.
Full textWainer, Jacques, Paulo Barthelmess, and Akhil Kumar. "W-RBAC — A Workflow Security Model Incorporating Controlled Overriding of Constraints." International Journal of Cooperative Information Systems 12, no. 04 (2003): 455–85. http://dx.doi.org/10.1142/s0218843003000814.
Full textAbdulkadir, .A. Adamu* Dong Wang Abdul-Fatou Adam. "ACCESS CONTROL IN DISTRIBUTED HEALTHCARE INFORMATION: THE KEY FEATURES." Global Journal of Engineering Science and Research Management 4, no. 4 (2017): 53–58. https://doi.org/10.5281/zenodo.569969.
Full textLiu, Gang, Runnan Zhang, Huimin Song, Can Wang, Jinhui Liu, and Aijun Liu. "Ts-RBAC: A RBAC model with transformation." Computers & Security 60 (July 2016): 52–61. http://dx.doi.org/10.1016/j.cose.2016.03.006.
Full textAftab, Muhammad Umar, Zhiguang Qin, Negalign Wake Hundera, et al. "Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model." Symmetry 11, no. 5 (2019): 669. http://dx.doi.org/10.3390/sym11050669.
Full textMuehlbacher, Joerg, and Christian Praher. "DS RBAC - Dynamic Sessions in Role Based Access Control." JUCS - Journal of Universal Computer Science 15, no. (3) (2009): 538–54. https://doi.org/10.3217/jucs-015-03-0538.
Full textPanzarini, Elisa, Valentina Inguscio, and Luciana Dini. "Overview of Cell Death Mechanisms Induced by Rose Bengal Acetate-Photodynamic Therapy." International Journal of Photoenergy 2011 (2011): 1–11. http://dx.doi.org/10.1155/2011/713726.
Full textLIN, CHIH-MIN, ANG-BUNG TING, CHUN-FEI HSU, and CHAO-MING CHUNG. "ADAPTIVE CONTROL FOR MIMO UNCERTAIN NONLINEAR SYSTEMS USING RECURRENT WAVELET NEURAL NETWORK." International Journal of Neural Systems 22, no. 01 (2012): 37–50. http://dx.doi.org/10.1142/s0129065712002992.
Full textRashid, Mamoon, and Er Rishma Chawla. "Securing Data Storage By Extending Role-Based Access Control." International Journal of Cloud Applications and Computing 3, no. 4 (2013): 28–37. http://dx.doi.org/10.4018/ijcac.2013100103.
Full textSchupfer, Emily, Soo Liang Ooi, Thomas C. Jeffries, Shaoyu Wang, Peter S. Micalos, and Sok Cheon Pak. "Changes in the Human Gut Microbiome during Dietary Supplementation with Modified Rice Bran Arabinoxylan Compound." Molecules 28, no. 14 (2023): 5400. http://dx.doi.org/10.3390/molecules28145400.
Full textWang, Tao, and Qiang Wu. "Role Minimization Optimization Algorithm Based on Concept Lattice Factor." Mathematics 11, no. 14 (2023): 3047. http://dx.doi.org/10.3390/math11143047.
Full textVerma, Prof Saurabh, Prof Ranu Sahu, Saloni Chourey, and Radhika Chourasiya. "Comparative Study of Healthcare Systems using RBAC Alone versus Integrating RBAC with Digital Watermarking for Enhanced Data Security." International Journal of Innovative Research in Science,Engineering and Technology 12, no. 04 (2023): 4675–79. http://dx.doi.org/10.15680/ijirset.2023.1204384.
Full textKUHLMANN, MIRCO, KARSTEN SOHR, and MARTIN GOGOLLA. "Employing UML and OCL for designing and analysing role-based access control." Mathematical Structures in Computer Science 23, no. 4 (2013): 796–833. http://dx.doi.org/10.1017/s0960129512000266.
Full textVinay Reddy Male. "Decoding Role-Based Access Control (RBAC)." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2082–90. https://doi.org/10.32628/cseit251112211.
Full textSatyanarayana Asundi, Sarat Piridi. "Enhancing Role-Based Access Control (RBAC) in Dataverse for Secure Enterprise Applications – Analyzing Advanced Security Models and Governance for Power Apps and Dynamics 365 CRM." Journal of Information Systems Engineering and Management 10, no. 41s (2025): 1214–24. https://doi.org/10.52783/jisem.v10i41s.9747.
Full textDaisy Sharmah. "Integrating Honey Bee Load Balancing Algorithm with Role-Based Access Control in Blockchain Technology to Minimise Response Time in Cloud Computing." Journal of Information Systems Engineering and Management 10, no. 33s (2025): 702–13. https://doi.org/10.52783/jisem.v10i33s.5629.
Full textDamiani, Maria Luisa, Elisa Bertino, Barbara Catania, and Paolo Perlasca. "GEO-RBAC." ACM Transactions on Information and System Security 10, no. 1 (2007): 2. http://dx.doi.org/10.1145/1210263.1210265.
Full textSong, Wan Li, Hai Fei Zhang, Wei Feng Wu, and Wen Jie He. "An Improved RBAC Model and its Application in Development of Information System." Advanced Materials Research 989-994 (July 2014): 4650–53. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4650.
Full textDas, Dipta, Andrew Walker, Vincent Bushong, Jan Svacina, Tomas Cerny, and Vashek Matyas. "On automated RBAC assessment by constructing a centralized perspective for microservice mesh." PeerJ Computer Science 7 (February 1, 2021): e376. http://dx.doi.org/10.7717/peerj-cs.376.
Full textOoi, Soo Liang, Peter S. Micalos, and Sok Cheon Pak. "Modified rice bran arabinoxylan as a nutraceutical in health and disease—A scoping review with bibliometric analysis." PLOS ONE 18, no. 8 (2023): e0290314. http://dx.doi.org/10.1371/journal.pone.0290314.
Full textFragkos, Georgios, Jay Johnson, and Eirini Eleni Tsiropoulou. "Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations." Energies 15, no. 17 (2022): 6375. http://dx.doi.org/10.3390/en15176375.
Full textYang, Jiyong, Xiajiong Shen, Wan Chen, Qiang Ge, Lei Zhang, and HaoLin Chen. "A Model Study on Collaborative Learning and Exploration of RBAC Roles." Wireless Communications and Mobile Computing 2021 (June 24, 2021): 1–9. http://dx.doi.org/10.1155/2021/5549109.
Full textAttia, Hasiba, Laid Kahloul, and Saber Benharzallah. "A New Hybrid Access Control Model for Security Policies in Multimodal Applications Environments." JUCS - Journal of Universal Computer Science 24, no. (4) (2018): 392–416. https://doi.org/10.3217/jucs-024-04-0392.
Full textTian, Wan Li, Lian Zhong Liu, and Meng Liu. "Roles Generation for Applications in RBAC Model." Applied Mechanics and Materials 411-414 (September 2013): 35–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.35.
Full textDeng, Ji Qiu, Xiao Qing Luo, and Huang Ling Gu. "The Design and Implementation of G-RBAC Model in Map Permission." Advanced Materials Research 268-270 (July 2011): 1457–61. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1457.
Full textZhang, Wei, and Zuo Quan Lin. "An ASP Based Approach of Inter-Domain Role Mapping." Advanced Materials Research 706-708 (June 2013): 1843–46. http://dx.doi.org/10.4028/www.scientific.net/amr.706-708.1843.
Full textV, Shashidhar, and Venkatesulu D. "Anomaly Detection for RBAC Systems in UNIX/LINUX Environment with User Behavior." International Journal of Engineering & Technology 7, no. 4.5 (2018): 24. http://dx.doi.org/10.14419/ijet.v7i4.5.20002.
Full textArun Kumar Akuthota. "Role-Based Access Control (RBAC) in Modern Cloud Security Governance: An In-depth Analysis." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 3297–311. https://doi.org/10.32628/cseit25112793.
Full textIshiaku, Awwal, and Christian Bassey. "Optimizing Synchronization and Role-Based Access Control in Double-Surgeon Telesurgery Cockpits." Journal of Internet Services and Information Security 15, no. 1 (2025): 330–47. https://doi.org/10.58346/jisis.2025.i1.021.
Full textRao, K. Rajesh, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, and Muttukrishnan Rajarajan. "Role recommender-RBAC: Optimizing user-role assignments in RBAC." Computer Communications 166 (January 2021): 140–53. http://dx.doi.org/10.1016/j.comcom.2020.12.006.
Full textAl-hadhrami, Nasser, Benjamin Aziz, and Lotfi ben Othmane. "An Incremental B-Model for RBAC-Controlled Electronic Marking System." International Journal of Secure Software Engineering 7, no. 2 (2016): 37–64. http://dx.doi.org/10.4018/ijsse.2016040103.
Full textZhang, Xianghui, Zuoping Zhu, Jianxin Sui, Yao Huang, and Chaojun Zuo. "A dual-role hierarchical RBAC extended security model based on department attributes and its application." E3S Web of Conferences 360 (2022): 01051. http://dx.doi.org/10.1051/e3sconf/202236001051.
Full textAli, Karriem H., Angelica B. Melillo, Susanna M. Leonard, et al. "An open-label, randomized clinical trial to assess the immunomodulatory activity of a novel oligosaccharide compound in healthy adults." Functional Foods in Health and Disease 2, no. 7 (2012): 265. http://dx.doi.org/10.31989/ffhd.v2i7.84.
Full textCharan Shankar Kummarapurugu. "Role-based access control in cloud-native applications: Evaluating best practices for secure multi-tenant Kubernetes environments." World Journal of Advanced Research and Reviews 1, no. 2 (2019): 045–53. http://dx.doi.org/10.30574/wjarr.2019.1.2.0008.
Full text