Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: RBAC.

Artykuły w czasopismach na temat „RBAC”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „RBAC”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Wang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.

Pełny tekst źródła
Streszczenie:
The normal role-based access control (RBAC) model decouples users and permissions through roles,and different software systems have different implementation syteles.The paper proposes an engine model which can configure the RBAC management systems flexibly.It is a configuration tool to generate different RBAC management systems which meet different users’ requirements. The practice proves that the engine model can improve the efficiency and quality of software development. The role-based access control model decouples users and permissions through roles in order to simplify authorized operatio
Style APA, Harvard, Vancouver, ISO itp.
2

Editorial Office, OBM Integrative and Complementary Medicine. "An Interview with Dr. Sok Cheon Pak." OBM Integrative and Complementary Medicine 07, no. 03 (2022): 1–4. http://dx.doi.org/10.21926/obm.icm.2203043.

Pełny tekst źródła
Streszczenie:
Interview with Dr. Sok Cheon Pak.<strong> </strong>Dr Pak as a physiologist currently leads and guides research into nutraceuticals to provide relevant and impactful clinical applications. The best example is the rice bran arabinoxylan compound (RBAC). RBAC is a functional food produced from hydrolysed rice bran denatured with shiitake mushroom enzymes. RBAC demonstrates strong immunomodulatory properties, particularly for enhancing the natural killer cell activity. Additionally, RBAC is a potent antiproliferative food supplement with strong evidence showing that it can arrest tumo
Style APA, Harvard, Vancouver, ISO itp.
3

Marquis, Yewande Alice. "From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts." Journal of Engineering Research and Reports 26, no. 5 (2024): 138–54. http://dx.doi.org/10.9734/jerr/2024/v26i51141.

Pełny tekst źródła
Streszczenie:
This study investigates the effectiveness of Role-Based Access Control (RBAC) systems in mitigating insider threats to database security within various organizational environments. Insider threats represent a significant challenge for database security, necessitating robust and adaptive security measures. By delineating access based on users' roles within an organization, RBAC emerges as a critical tool against such threats. Employing a quantitative research methodology, this work gathered data through a survey targeting professionals directly involved in the security and management of organiz
Style APA, Harvard, Vancouver, ISO itp.
4

M Sahyudi and Erliyan Redy Susanto. "Analisis Implementasi Sistem Keamanan Basis Data Berbasis Role-Based Access Control (RBAC) pada Aplikasi Enterprise Resource Planning." SATESI: Jurnal Sains Teknologi dan Sistem Informasi 5, no. 1 (2025): 105–16. https://doi.org/10.54259/satesi.v5i1.3997.

Pełny tekst źródła
Streszczenie:
Role-Based Access Control (RBAC) has become the main approach in improving data security in various information systems. This study analyzes the implementation of RBAC in the context of Enterprise Resource Planning (ERP) applications and cloud-based, mobile, and multi-domain systems. Using a systematic literature review (SLR) methodology, this study synthesizes findings from various studies to evaluate the effectiveness of RBAC in addressing challenges such as data privacy, regulatory compliance, and access policy complexity. The results show that the integration of intelligent technologies, s
Style APA, Harvard, Vancouver, ISO itp.
5

Nyame, Gabriel, and Zhiguang Qin. "Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework." Information 11, no. 6 (2020): 334. http://dx.doi.org/10.3390/info11060334.

Pełny tekst źródła
Streszczenie:
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations. As a socio-technical concept, the notion of role in RBAC has been overemphasized, while very little attention is given to the precursors: role strain, role ambiguity, and role conflict. These constructs provide more significant insights into RBAC design in Knowledge Management Systems (KMS). KMS is the technology-based knowledge management tool used to acquire, store, share, and apply knowledge for improved collaboration and knowledge-value cr
Style APA, Harvard, Vancouver, ISO itp.
6

Ooi, Soo Liang, Peter S. Micalos, and Sok Cheon Pak. "Modified Rice Bran Arabinoxylan by Lentinus edodes Mycelial Enzyme as an Immunoceutical for Health and Aging—A Comprehensive Literature Review." Molecules 28, no. 17 (2023): 6313. http://dx.doi.org/10.3390/molecules28176313.

Pełny tekst źródła
Streszczenie:
Rice bran arabinoxylan compound (RBAC) is derived from defatted rice bran enzymatically treated with Lentinus edodes mycelium. This review explores biologically active compounds and mechanisms of action that support RBAC as an immunomodulating nutraceutical in generally healthy and/or aging individuals. Thirty-seven (n = 37) primary research articles fulfilled the selection criteria for review. Most research is based on Biobran MGN-3, which consists of complex heteropolysaccharides with arabinoxylan as its primary structure while also containing galactan and glucan. RBAC was found to invoke im
Style APA, Harvard, Vancouver, ISO itp.
7

Ooi, Soo Liang, Sok Cheon Pak, Peter S. Micalos, et al. "The Health-Promoting Properties and Clinical Applications of Rice Bran Arabinoxylan Modified with Shiitake Mushroom Enzyme—A Narrative Review." Molecules 26, no. 9 (2021): 2539. http://dx.doi.org/10.3390/molecules26092539.

Pełny tekst źródła
Streszczenie:
Rice bran arabinoxylan compound (RBAC) is derived from defatted rice bran hydrolyzed with Lentinus edodes mycelial enzyme. It has been marketed as a functional food and a nutraceutical with health-promoting properties. Some research has demonstrated this rice bran derivative to be a potent immunomodulator, which also possesses anti-inflammatory, antioxidant, and anti-angiogenic properties. To date, research on RBAC has predominantly focused on its immunomodulatory action and application as a complementary therapy for cancer. Nonetheless, the clinical applications of RBAC can extend beyond canc
Style APA, Harvard, Vancouver, ISO itp.
8

Lewis, John E., Steven E. Atlas, Oscar L. Higuera, et al. "The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease." Evidence-Based Complementary and Alternative Medicine 2018 (May 3, 2018): 1–10. http://dx.doi.org/10.1155/2018/1751583.

Pełny tekst źródła
Streszczenie:
The primary objective of the study was to evaluate the effect of a hydrolyzed polysaccharide, Rice Bran Arabinoxylan Compound (RBAC), on biomarkers in adults with nonalcoholic fatty liver disease (NAFLD). A 90-day randomized double-blind placebo-controlled trial examined the effect of RBAC on complete blood count, liver enzymes, lipids, oxidative stress markers, cytokines, and growth factors. Twenty-three adults with NAFLD were enrolled and randomly assigned to one of the two study conditions (n=12 RBAC and n=11 placebo) and consumed 1 gram/day of either compound for 90 days. Subjects were ass
Style APA, Harvard, Vancouver, ISO itp.
9

de Carvalho Junior, Marcelo Antonio, and Paulo Bandiera-Paiva. "Health Information System Role-Based Access Control Current Security Trends and Challenges." Journal of Healthcare Engineering 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/6510249.

Pełny tekst źródła
Streszczenie:
Objective. This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. Method. We have selected articles related to our investigation theme “RBAC trends and limitations” in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the
Style APA, Harvard, Vancouver, ISO itp.
10

Mitra, Barsha, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri. "Migrating from RBAC to temporal RBAC." IET Information Security 11, no. 5 (2017): 294–300. http://dx.doi.org/10.1049/iet-ifs.2016.0258.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Darwish, Wesam, and Konstantin Beznosov. "Analysis of ANSI RBAC Support in EJB." International Journal of Secure Software Engineering 2, no. 2 (2011): 25–52. http://dx.doi.org/10.4018/jsse.2011040102.

Pełny tekst źródła
Streszczenie:
This paper analyzes access control mechanisms of the Enterprise Java Beans (EJB) architecture and defines a configuration of the EJB protection system in a more precise and less ambiguous language than the EJB 3.0 standard. Using this configuration, the authors suggest an algorithm that formally specifies the semantics of authorization decisions in EJB. The level of support is analyzed for the American National Standard Institute’s (ANSI) specification of Role-Based Access Control (RBAC) components and functional specification in EJB. The results indicate that the EJB specification falls short
Style APA, Harvard, Vancouver, ISO itp.
12

Zhang, Jian Hua, and Qiang Liu. "An Administration Iteration Problem and its Solution when Deploying the RBAC Model." Applied Mechanics and Materials 263-266 (December 2012): 1584–87. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1584.

Pełny tekst źródła
Streszczenie:
Access control is an important infrastructure of an information system. Role-Based Access Control (RBAC) model is the main-stream access control model. When deploying a RBAC model, there is an administration iteration problem which needs the information engineers to define the administrator structure before running the RBAC model, which make the deploying process redundancy and complex, make the running process rigid, and result in decrease of control capability of RBAC model. We present a top-down method. In this method, we define the administration authority as the source of management autho
Style APA, Harvard, Vancouver, ISO itp.
13

Zhao, Yu Lan, and Chun Feng Jiang. "Research of Access Control Models in Personal Networks." Advanced Materials Research 989-994 (July 2014): 4751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4751.

Pełny tekst źródła
Streszczenie:
How to prevent illegal users from sharing system resources was one of the main purposes for MAGNET Security Group. This paper introduced some major access control models such as traditional access control models, role-based access control model (RBAC), task-based access control model (TBAC) and role-task-based access control model (T-RBAC). In the end, a feasible scheme PN_T-RBAC was proposed at the base of the T-RBAC model in existence, which was suitable for the coalition environment of personal networks.
Style APA, Harvard, Vancouver, ISO itp.
14

Lewis, John E., Steven E. Atlas, Oscar L. Higuera, et al. "Corrigendum to “The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease”." Evidence-Based Complementary and Alternative Medicine 2020 (April 7, 2020): 1–10. http://dx.doi.org/10.1155/2020/9575878.

Pełny tekst źródła
Streszczenie:
The primary objective of the study was to evaluate the effect of a hydrolyzed polysaccharide, Rice Bran Arabinoxylan Compound (RBAC), on biomarkers in adults with nonalcoholic fatty liver disease (NAFLD). A 90-day randomized double-blind placebo-controlled trial examined the effect of RBAC on complete blood count, liver enzymes, lipids, oxidative stress markers, cytokines, and growth factors. Twenty-three adults with NAFLD were enrolled and randomly assigned to one of the two study conditions (n = 12 RBAC and n = 11 placebo) and consumed 1 gram/day of either compound for 90 days. Subjects were
Style APA, Harvard, Vancouver, ISO itp.
15

Sri, kanth Mandru. "Role-Based Access Control (RBAC) in Modern IAM Systems: A study on the effectiveness and challenges of RBAC in managing access to resources in large organizations." European Journal of Advances in Engineering and Technology 6, no. 4 (2019): 57–64. https://doi.org/10.5281/zenodo.13353634.

Pełny tekst źródła
Streszczenie:
Modern Identity and Access Management, IAM, solutions designed for today’s organizations cannot be complete without considering RBAC, particularly for large organizations. This paper aims to review the computational results of employing RBAC to enhance the security features and reduce the level of administrative cost, as well as weigh the advantages and disadvantages of this resource access management system. RBAC ensures compliance with the organizational requirements and brings simplicity to access control through the formation of roles that come with certain privileges. However, it is
Style APA, Harvard, Vancouver, ISO itp.
16

Shanu Khare, Payal Thakur, Navjot Singh Talwandi, and Vikash Yadav. "Securing Microservice Architecture: Load Balancing and Role-Based Access Control." International Journal on Engineering Artificial Intelligence Management, Decision Support, and Policies 1, no. 1 (2024): 21–28. https://doi.org/10.63503/j.ijaimd.2024.7.

Pełny tekst źródła
Streszczenie:
This study focuses on the security aspects within microservice architecture, particularly addressing load balancing and role-based access control (RBAC). Exploring the intersection of load balancing techniques and RBAC mechanisms, the research aims to enhance the security posture of microservices. By evalu-ating strategies for efficient load distribution and implementing RBAC proto-cols, the study seeks to fortify the architecture against potential vulnerabili-ties. The integration of load balancing and RBAC not only ensures optimized resource utilization but also strengthens access control me
Style APA, Harvard, Vancouver, ISO itp.
17

Taresh Mehra. "The Critical Role of Role-Based Access Control (RBAC) in securing backup, recovery, and storage systems." International Journal of Science and Research Archive 13, no. 1 (2024): 1192–94. http://dx.doi.org/10.30574/ijsra.2024.13.1.1733.

Pełny tekst źródła
Streszczenie:
In the contemporary digital landscape, safeguarding data through robust access control mechanisms is crucial. Role-Based Access Control (RBAC) is an effective strategy for managing access to backup and recovery systems, as well as storage devices. RBAC assigns permissions based on user roles, thereby enforcing the principle of least privilege and enhancing data security. This blog explores the significance of RBAC in these contexts and extends its relevance to ransomware and malware threats, as well as disaster recovery. Supported by scientific research and industry case studies, it underscore
Style APA, Harvard, Vancouver, ISO itp.
18

Wainer, Jacques, Paulo Barthelmess, and Akhil Kumar. "W-RBAC — A Workflow Security Model Incorporating Controlled Overriding of Constraints." International Journal of Cooperative Information Systems 12, no. 04 (2003): 455–85. http://dx.doi.org/10.1142/s0218843003000814.

Pełny tekst źródła
Streszczenie:
This paper presents a pair of role-based access control models for workflow systems, collectively known as the W-RBAC models. The first of these models, W0-RBAC is based on a framework that couples a powerful RBAC-based permission service and a workflow component with clear separation of concerns for ease of administration of authorizations. The permission service is the focus of the work, providing an expressive logic-based language for the selection of users authorized to perform workflow tasks, with preference ranking. W1-RBAC extends the basic model by incorporating exception handling capa
Style APA, Harvard, Vancouver, ISO itp.
19

Abdulkadir, .A. Adamu* Dong Wang Abdul-Fatou Adam. "ACCESS CONTROL IN DISTRIBUTED HEALTHCARE INFORMATION: THE KEY FEATURES." Global Journal of Engineering Science and Research Management 4, no. 4 (2017): 53–58. https://doi.org/10.5281/zenodo.569969.

Pełny tekst źródła
Streszczenie:
Information and communication technologies (ICTs) today provide ubiquitous possibilities to share electronic patient’s data across several healthcare organizations and hospital departments. Data security is therefore a strong requirement to ensure compliance with confidentiality and privacy rule of medical records. However, access control mechanism in Nigeria’s health information systems do not sufficiently guarantee managed access, data and resource protection. To conquer the problems existing in the current access control mechanism available to University of Abuja Teaching Hospital (UATH), N
Style APA, Harvard, Vancouver, ISO itp.
20

Liu, Gang, Runnan Zhang, Huimin Song, Can Wang, Jinhui Liu, and Aijun Liu. "Ts-RBAC: A RBAC model with transformation." Computers & Security 60 (July 2016): 52–61. http://dx.doi.org/10.1016/j.cose.2016.03.006.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Aftab, Muhammad Umar, Zhiguang Qin, Negalign Wake Hundera, et al. "Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model." Symmetry 11, no. 5 (2019): 669. http://dx.doi.org/10.3390/sym11050669.

Pełny tekst źródła
Streszczenie:
A major development in the field of access control is the dominant role-based access control (RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the concept of roles. In addition, attribute-based access control (ABAC) is added to the access control models, which is famous for its dynamic behavior. Separation of duty (SOD) is used for enforcing least privilege concept in RBAC and ABAC. Moreover, SOD is a powerful tool that is used to protect an organization from internal security attacks and threats. Different problems have been found in the implementation of SOD at
Style APA, Harvard, Vancouver, ISO itp.
22

Muehlbacher, Joerg, and Christian Praher. "DS RBAC - Dynamic Sessions in Role Based Access Control." JUCS - Journal of Universal Computer Science 15, no. (3) (2009): 538–54. https://doi.org/10.3217/jucs-015-03-0538.

Pełny tekst źródła
Streszczenie:
Besides the well established access control models, Discretionary Access Control (DAC) and Mandatory Access Control (MAC), the policy neutral Role Based Access Control (RBAC) is gaining increasingly momentum. An important step towards a wide acceptance of RBAC has been achieved by the standardization of RBAC through the American National Standards Institute (ANSI) in 2004. While the concept of sessions specified in the ANSI RBAC standard allows for differentiated role selections according to tasks that have to be performed by users, it is very likely that more roles will be activated in a sess
Style APA, Harvard, Vancouver, ISO itp.
23

Panzarini, Elisa, Valentina Inguscio, and Luciana Dini. "Overview of Cell Death Mechanisms Induced by Rose Bengal Acetate-Photodynamic Therapy." International Journal of Photoenergy 2011 (2011): 1–11. http://dx.doi.org/10.1155/2011/713726.

Pełny tekst źródła
Streszczenie:
Photodynamic Therapy (PDT) is a non-invasive treatment for different pathologies, cancer included, using three key components: non-toxic light-activated drug (Photosensitizer, PS), visible light, and oxygen. Their interaction triggers photochemical reactions leading to Reactive Oxygen Species (ROS) generation, that mediate cytotoxicity and cell death. In the present paper, the most important findings about the synthetic dye Rose Bengal Acetate (RBAc), an emerging photosensitizer for its efficient induction of cell death, will be reported with the aim to integrate RBAc phototoxicity to novel th
Style APA, Harvard, Vancouver, ISO itp.
24

LIN, CHIH-MIN, ANG-BUNG TING, CHUN-FEI HSU, and CHAO-MING CHUNG. "ADAPTIVE CONTROL FOR MIMO UNCERTAIN NONLINEAR SYSTEMS USING RECURRENT WAVELET NEURAL NETWORK." International Journal of Neural Systems 22, no. 01 (2012): 37–50. http://dx.doi.org/10.1142/s0129065712002992.

Pełny tekst źródła
Streszczenie:
Recurrent wavelet neural network (RWNN) has the advantages such as fast learning property, good generalization capability and information storing ability. With these advantages, this paper proposes an RWNN-based adaptive control (RBAC) system for multi-input multi-output (MIMO) uncertain nonlinear systems. The RBAC system is composed of a neural controller and a bounding compensator. The neural controller uses an RWNN to online mimic an ideal controller, and the bounding compensator can provide smooth and chattering-free stability compensation. From the Lyapunov stability analysis, it is shown
Style APA, Harvard, Vancouver, ISO itp.
25

Rashid, Mamoon, and Er Rishma Chawla. "Securing Data Storage By Extending Role-Based Access Control." International Journal of Cloud Applications and Computing 3, no. 4 (2013): 28–37. http://dx.doi.org/10.4018/ijcac.2013100103.

Pełny tekst źródła
Streszczenie:
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, the authors highlight the drawbacks of RBAC models in terms of access control and authorization and later provide a more viable extended-RBAC model, which enhances and extends its powers to make any Cloud Server more secure by adding valuable constraints. Later the Blobs are stored on cloud server which is then accessed b
Style APA, Harvard, Vancouver, ISO itp.
26

Schupfer, Emily, Soo Liang Ooi, Thomas C. Jeffries, Shaoyu Wang, Peter S. Micalos, and Sok Cheon Pak. "Changes in the Human Gut Microbiome during Dietary Supplementation with Modified Rice Bran Arabinoxylan Compound." Molecules 28, no. 14 (2023): 5400. http://dx.doi.org/10.3390/molecules28145400.

Pełny tekst źródła
Streszczenie:
This study investigated the effects of a modified rice bran arabinoxylan compound (RBAC) as a dietary supplement on the gut microbiota of healthy adults. Ten volunteers supplemented their diet with 1 g of RBAC for six weeks and 3 g of RBAC for another six weeks, with a three-week washout period. Faecal samples were collected every 3 weeks over 21 weeks. Microbiota from faecal samples were profiled using 16S rRNA sequencing. Assessment of alpha and beta microbiota diversity was performed using the QIIME2 platform. The results revealed that alpha and beta diversity were not associated with the e
Style APA, Harvard, Vancouver, ISO itp.
27

Wang, Tao, and Qiang Wu. "Role Minimization Optimization Algorithm Based on Concept Lattice Factor." Mathematics 11, no. 14 (2023): 3047. http://dx.doi.org/10.3390/math11143047.

Pełny tekst źródła
Streszczenie:
Role-based access control (RBAC) is a widely adopted security model that provides a flexible and scalable approach for managing permissions in various domains. One of the critical challenges in RBAC is the efficient assignment of roles to users while minimizing the number of roles involved. This article presents a novel role minimization optimization algorithm (RMOA) based on the concept lattice factor to address this challenge. The proposed RMOA leverages the concept lattice, a mathematical structure derived from formal concept analysis, to model and analyze the relationships between roles, p
Style APA, Harvard, Vancouver, ISO itp.
28

Verma, Prof Saurabh, Prof Ranu Sahu, Saloni Chourey, and Radhika Chourasiya. "Comparative Study of Healthcare Systems using RBAC Alone versus Integrating RBAC with Digital Watermarking for Enhanced Data Security." International Journal of Innovative Research in Science,Engineering and Technology 12, no. 04 (2023): 4675–79. http://dx.doi.org/10.15680/ijirset.2023.1204384.

Pełny tekst źródła
Streszczenie:
This comparative study examines the effectiveness of Role-Based Access Control (RBAC) alone versus its integration with digital watermarking in enhancing data security within healthcare systems. RBAC is employed widely to regulate access based on user roles, while digital watermarking adds an additional layer of security by embedding imperceptible markers for data integrity verification. The study evaluates security incidents, operational efficiency, regulatory compliance, and user satisfaction across two groups: healthcare systems using RBAC alone (Group A) and those integrating RBAC with dig
Style APA, Harvard, Vancouver, ISO itp.
29

KUHLMANN, MIRCO, KARSTEN SOHR, and MARTIN GOGOLLA. "Employing UML and OCL for designing and analysing role-based access control." Mathematical Structures in Computer Science 23, no. 4 (2013): 796–833. http://dx.doi.org/10.1017/s0960129512000266.

Pełny tekst źródła
Streszczenie:
The stringent security requirements of organisations like banks or hospitals frequently adopt role-based access control (RBAC) principles to represent and simplify their internal permission management. While representing a fundamental advanced RBAC concept enabling precise restrictions on access rights, authorisation constraints increase the complexity of the resulting security policies so that tool support for convenient creation and adequate validation is required. A particular contribution of our work is a new approach to developing and analysing RBAC policies using a UML-based domain-speci
Style APA, Harvard, Vancouver, ISO itp.
30

Vinay Reddy Male. "Decoding Role-Based Access Control (RBAC)." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2082–90. https://doi.org/10.32628/cseit251112211.

Pełny tekst źródła
Streszczenie:
This article provides a comprehensive examination of Role-Based Access Control (RBAC) and its significance in modern cybersecurity, particularly within cloud environments. It explores the fundamental concepts of RBAC, including its core principle of assigning access rights based on organizational roles rather than individual users. The article delves into the implementation process, discussing role definition, permission assignment, and user-role association. It highlights the key advantages of RBAC, such as simplified permission management, enhanced security through the principle of least pri
Style APA, Harvard, Vancouver, ISO itp.
31

Satyanarayana Asundi, Sarat Piridi. "Enhancing Role-Based Access Control (RBAC) in Dataverse for Secure Enterprise Applications – Analyzing Advanced Security Models and Governance for Power Apps and Dynamics 365 CRM." Journal of Information Systems Engineering and Management 10, no. 41s (2025): 1214–24. https://doi.org/10.52783/jisem.v10i41s.9747.

Pełny tekst źródła
Streszczenie:
The purpose of this research is to enhance Role Based Access Control (RBAC) in Microsoft Dataverse to achieve secure deployment of enterprise application in Power Apps and Dynamics 365 CRM. The study shows this by integrating the integration of an advanced security model such as Authorizing Workflow Task RBAC (AW-TRBAC), AI driven threat detection and dynamic separation of duties to result in dramatic improvements in governance of access, anomaly detection and operational efficiency. The paper presents scalable solutions to the identified limitations of traditional RBAC using quantitative anal
Style APA, Harvard, Vancouver, ISO itp.
32

Daisy Sharmah. "Integrating Honey Bee Load Balancing Algorithm with Role-Based Access Control in Blockchain Technology to Minimise Response Time in Cloud Computing." Journal of Information Systems Engineering and Management 10, no. 33s (2025): 702–13. https://doi.org/10.52783/jisem.v10i33s.5629.

Pełny tekst źródła
Streszczenie:
The RBAC is considered one of the best security mechanisms used in cloud computing to assign roles and grant specific permissions. The implementation of a RBAC mechanism for load balancing can enhance the overall performance of the server. In this paper, we are focusing on the significance of using the RBAC mechanism in the Honey Bee Load Balancing Algorithm to improve the security of the blockchain consortium system. We have proposed an algorithm using the concept of RBAC with Honey Bee Load Balancing Algorithm in Blockchain to minimize the response time in the Cloud computing. The proposed a
Style APA, Harvard, Vancouver, ISO itp.
33

Damiani, Maria Luisa, Elisa Bertino, Barbara Catania, and Paolo Perlasca. "GEO-RBAC." ACM Transactions on Information and System Security 10, no. 1 (2007): 2. http://dx.doi.org/10.1145/1210263.1210265.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Song, Wan Li, Hai Fei Zhang, Wei Feng Wu, and Wen Jie He. "An Improved RBAC Model and its Application in Development of Information System." Advanced Materials Research 989-994 (July 2014): 4650–53. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4650.

Pełny tekst źródła
Streszczenie:
Aiming at the deficiencies of traditional RBAC model, on the basis of studying of the models introduced in the literatures published, this paper puts forwards an improved model--MR-RBAC, including its concepts and design. This model is implemented by adding restriction strategy on the operation objects and data objects, assignment different privileges to different users via configuration mapping of functions and menus. The implementation and practice indicates that the MR-RBAC model not only simplifies privilege management, but also improves the system security and privileges management flexib
Style APA, Harvard, Vancouver, ISO itp.
35

Das, Dipta, Andrew Walker, Vincent Bushong, Jan Svacina, Tomas Cerny, and Vashek Matyas. "On automated RBAC assessment by constructing a centralized perspective for microservice mesh." PeerJ Computer Science 7 (February 1, 2021): e376. http://dx.doi.org/10.7717/peerj-cs.376.

Pełny tekst źródła
Streszczenie:
It is important in software development to enforce proper restrictions on protected services and resources. Typically software services can be accessed through REST API endpoints where restrictions can be applied using the Role-Based Access Control (RBAC) model. However, RBAC policies can be inconsistent across services, and they require proper assessment. Currently, developers use penetration testing, which is a costly and cumbersome process for a large number of APIs. In addition, modern applications are split into individual microservices and lack a unified view in order to carry out automa
Style APA, Harvard, Vancouver, ISO itp.
36

Ooi, Soo Liang, Peter S. Micalos, and Sok Cheon Pak. "Modified rice bran arabinoxylan as a nutraceutical in health and disease—A scoping review with bibliometric analysis." PLOS ONE 18, no. 8 (2023): e0290314. http://dx.doi.org/10.1371/journal.pone.0290314.

Pełny tekst źródła
Streszczenie:
Rice bran arabinoxylan compound (RBAC) is a polysaccharide modified by Lentinus edodes mycelial enzyme widely used as a nutraceutical. To explore translational research on RBAC, a scoping review was conducted to synthesise research evidence from English (MEDLINE, ProQuest, CENTRAL, Emcare, CINAHL+, Web of Science), Japanese (CiNii, J-Stage), Korean (KCI, RISS, ScienceON), and Chinese (CNKI, Wanfang) sources while combining bibliometrics and network analyses for data visualisation. Searches were conducted between September and October 2022. Ninety-eight articles on RBAC and the biological activ
Style APA, Harvard, Vancouver, ISO itp.
37

Fragkos, Georgios, Jay Johnson, and Eirini Eleni Tsiropoulou. "Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations." Energies 15, no. 17 (2022): 6375. http://dx.doi.org/10.3390/en15176375.

Pełny tekst źródła
Streszczenie:
A global transition to power grids with high penetrations of renewable energy generation is being driven in part by rapid installations of distributed energy resources (DER). New DER equipment includes standardized IEEE 1547-2018 communication interfaces and proprietary communications capabilities. Interoperable DER provides new monitoring and control capabilities. The existence of multiple entities with different roles and responsibilities within the DER ecosystem makes the Access Control (AC) mechanism necessary. In this paper, we introduce and compare two novel architectures, which provide
Style APA, Harvard, Vancouver, ISO itp.
38

Yang, Jiyong, Xiajiong Shen, Wan Chen, Qiang Ge, Lei Zhang, and HaoLin Chen. "A Model Study on Collaborative Learning and Exploration of RBAC Roles." Wireless Communications and Mobile Computing 2021 (June 24, 2021): 1–9. http://dx.doi.org/10.1155/2021/5549109.

Pełny tekst źródła
Streszczenie:
Role-based access control (RBAC) can effectively guarantee the security of user system data. With its good flexibility and security, RBAC occupies a mainstream position in the field of access control. However, the complexity and time-consuming of the role establishment process seriously hinder the development and application of the RBAC model. The introduction of the assistant interactive question answering algorithm based on attribute exploration (semiautomatic heuristic way to build an RBAC system) greatly reduces the complexity of building a role system. However, there are some defects in t
Style APA, Harvard, Vancouver, ISO itp.
39

Attia, Hasiba, Laid Kahloul, and Saber Benharzallah. "A New Hybrid Access Control Model for Security Policies in Multimodal Applications Environments." JUCS - Journal of Universal Computer Science 24, no. (4) (2018): 392–416. https://doi.org/10.3217/jucs-024-04-0392.

Pełny tekst źródła
Streszczenie:
New technologies as cloud computing and internet of things (IoT) has expanded the range of multimodal applications. This expansion, in several computing and heterogeneous environments, makes access control an important issue in multimodal applications. Indeed, a variety of access control models have been developed to address different aspects of security problems. The two most popular basic models are: Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC). The both models RBAC and ABAC have their specific features and they can complement each other. For that, providing a h
Style APA, Harvard, Vancouver, ISO itp.
40

Tian, Wan Li, Lian Zhong Liu, and Meng Liu. "Roles Generation for Applications in RBAC Model." Applied Mechanics and Materials 411-414 (September 2013): 35–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.35.

Pełny tekst źródła
Streszczenie:
RBAC has been widely used for the reason of its efficiency, convenience and safety. But as the traditional user-oriented access control strategy, the RBAC carries the disadvantage of user-oriented access control as well. It always assumes that the application is credible and the behavior of the program represents the wishes of the user. However, this assumption is increasingly proving to be false and numbers of prevalent types of security attacks leverage this weakness to misuse the authority of users. Based on RBAC and learn from the concept of FBAC, this paper will proposed a solution about
Style APA, Harvard, Vancouver, ISO itp.
41

Deng, Ji Qiu, Xiao Qing Luo, and Huang Ling Gu. "The Design and Implementation of G-RBAC Model in Map Permission." Advanced Materials Research 268-270 (July 2011): 1457–61. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1457.

Pełny tekst źródła
Streszczenie:
With the development of WebGIS, it plays a more and more important role in government and enterprises. The effective way to access and control spatial data, because of relating to the security and business secrets of government and enterprises, becomes an urgent concern for them. Now, RBAC (Role Based Access Control) can be a valid method to access and control uniform resource, but it is lack of flexibility and real-time ability to control spatial data in WebGIS. For that, this paper proposes G-RBAC model based on RBAC model to enhance the flexibility and real-time ability to access spatial da
Style APA, Harvard, Vancouver, ISO itp.
42

Zhang, Wei, and Zuo Quan Lin. "An ASP Based Approach of Inter-Domain Role Mapping." Advanced Materials Research 706-708 (June 2013): 1843–46. http://dx.doi.org/10.4028/www.scientific.net/amr.706-708.1843.

Pełny tekst źródła
Streszczenie:
Although the ANSI RBAC model has achieved great success in the enterprise, it provides no mechanism for the urgent interoperation needs between distributed domains. This paper presents an ASP based approach to extend traditional RBAC model for inter-domain cooperation. We first translate the RBAC models with the IDRM problem into answer set programs, and then compute the solutions via an answer set solver. Finally, we discuss the safety and availability of our approach and ensure the models conflict-free. It is concluded that our approach supports the collaborating environments well with flexi
Style APA, Harvard, Vancouver, ISO itp.
43

V, Shashidhar, and Venkatesulu D. "Anomaly Detection for RBAC Systems in UNIX/LINUX Environment with User Behavior." International Journal of Engineering & Technology 7, no. 4.5 (2018): 24. http://dx.doi.org/10.14419/ijet.v7i4.5.20002.

Pełny tekst źródła
Streszczenie:
UNIX and LINUX are popular operating systems because of their free open source. By using RBAC model permissions are allocated based on user roles in UNIX/ LINUX environment. The RBAC model manages the privileges of the user within a system or application. However it is possible for a user to misuse his privileges that are assigned. Misuse of privileges cannot be identified by RBAC as it works based on rules. This paper suggests an anomaly detection technique to detect misuse of privileges. It keeps track of the user behavior and identifies anomalies in user behavior which helps in misuse of pr
Style APA, Harvard, Vancouver, ISO itp.
44

Arun Kumar Akuthota. "Role-Based Access Control (RBAC) in Modern Cloud Security Governance: An In-depth Analysis." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 3297–311. https://doi.org/10.32628/cseit25112793.

Pełny tekst źródła
Streszczenie:
This article examines the evolving role of Role-Based Access Control (RBAC) in modern cloud security governance, with particular emphasis on its implementation within SAP Business Technology Platform environments. The article investigates how RBAC has transformed from a traditional access control mechanism into an AI-enhanced security framework capable of addressing contemporary cloud security challenges. Through examination of real-world implementations, the article demonstrates RBAC's effectiveness in reducing security incidents, streamlining administrative processes, and ensuring regulatory
Style APA, Harvard, Vancouver, ISO itp.
45

Ishiaku, Awwal, and Christian Bassey. "Optimizing Synchronization and Role-Based Access Control in Double-Surgeon Telesurgery Cockpits." Journal of Internet Services and Information Security 15, no. 1 (2025): 330–47. https://doi.org/10.58346/jisis.2025.i1.021.

Pełny tekst źródła
Streszczenie:
The double-surgeon cockpit is an innovation in telesurgery that allows two surgeons to collaborate by remotely controlling a robot to perform surgical operations. However, it also introduces new challenges in synchronization and Role-Based Access Control (RBAC) due to the need for precise coordination and secure operation. In this paper, we address these challenges and propose an optimized synchronization strategy and implement RBAC within double-surgeon cockpits. The synchronization strategy combines passive latency monitoring and active command throttling to ensure coordinated actions from m
Style APA, Harvard, Vancouver, ISO itp.
46

Rao, K. Rajesh, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, and Muttukrishnan Rajarajan. "Role recommender-RBAC: Optimizing user-role assignments in RBAC." Computer Communications 166 (January 2021): 140–53. http://dx.doi.org/10.1016/j.comcom.2020.12.006.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Al-hadhrami, Nasser, Benjamin Aziz, and Lotfi ben Othmane. "An Incremental B-Model for RBAC-Controlled Electronic Marking System." International Journal of Secure Software Engineering 7, no. 2 (2016): 37–64. http://dx.doi.org/10.4018/ijsse.2016040103.

Pełny tekst źródła
Streszczenie:
The incremental development of software through the addition of new features and the insertion of new access rules potentially renders the access control models inconsistent and creates security flaws. This paper proposes modeling Role Based Access Control (RBAC) models of these software using the B language and re-evaluating the consistency of the models following model changes. It shows the mechanism of formalizing RBAC policies of an Electronic Marking System (EMS) using B specifications and illustrates the verification of the consistency of the RBAC specification, using model checking and
Style APA, Harvard, Vancouver, ISO itp.
48

Zhang, Xianghui, Zuoping Zhu, Jianxin Sui, Yao Huang, and Chaojun Zuo. "A dual-role hierarchical RBAC extended security model based on department attributes and its application." E3S Web of Conferences 360 (2022): 01051. http://dx.doi.org/10.1051/e3sconf/202236001051.

Pełny tekst źródła
Streszczenie:
In order to overcome the problems of the classic RBAC model, such as user identity cannot be verified, role assignment conflicts, permission leakage, complicated roles and permissions configuration, etc., this paper proposes a dual-role hierarchical RBAC extended security model based on department attributes. Firstly, based on the identity authentication mechanism, the legality of the user identity used by the system and its department attributes are authenticated, and the legal identity users are associated with their departments. Then, the roles were divided into responsibility roles and sys
Style APA, Harvard, Vancouver, ISO itp.
49

Ali, Karriem H., Angelica B. Melillo, Susanna M. Leonard, et al. "An open-label, randomized clinical trial to assess the immunomodulatory activity of a novel oligosaccharide compound in healthy adults." Functional Foods in Health and Disease 2, no. 7 (2012): 265. http://dx.doi.org/10.31989/ffhd.v2i7.84.

Pełny tekst źródła
Streszczenie:
Background: Rice Bran Arabinoxylan Compound (RBAC) is a nutritional supplement produced by enzymatic hydrolysis of hemicellulose B derived from rice bran. Several in vitro studies and clinical reports have shown RBAC to possess promising immunomodulating effects, specifically with respect to natural killer cell and cytokine activity. The concept of a true immunomodulator is an agent possessing a broad range of activity dependent upon the existing state of health and immunity in the individual host. The present study investigated the immunomodulatory effect of RBAC in a healthy adult human popu
Style APA, Harvard, Vancouver, ISO itp.
50

Charan Shankar Kummarapurugu. "Role-based access control in cloud-native applications: Evaluating best practices for secure multi-tenant Kubernetes environments." World Journal of Advanced Research and Reviews 1, no. 2 (2019): 045–53. http://dx.doi.org/10.30574/wjarr.2019.1.2.0008.

Pełny tekst źródła
Streszczenie:
As cloud-native applications grow in complexity and adoption, particularly within multi-tenant Kubernetes environ- ments, security and access control mechanisms are paramount. Role-Based Access Control (RBAC) is increasingly utilized as a critical security framework to manage permissions across users and services in these cloud-native platforms. However, implementing RBAC in Kubernetes presents unique challenges, especially in multi-tenant setups where robust access separation and efficient permission management are essential. This paper explores best practices for RBAC in multi-tenant Kuberne
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!