Artykuły w czasopismach na temat „RBAC”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „RBAC”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Wang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.
Pełny tekst źródłaEditorial Office, OBM Integrative and Complementary Medicine. "An Interview with Dr. Sok Cheon Pak." OBM Integrative and Complementary Medicine 07, no. 03 (2022): 1–4. http://dx.doi.org/10.21926/obm.icm.2203043.
Pełny tekst źródłaMarquis, Yewande Alice. "From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts." Journal of Engineering Research and Reports 26, no. 5 (2024): 138–54. http://dx.doi.org/10.9734/jerr/2024/v26i51141.
Pełny tekst źródłaM Sahyudi and Erliyan Redy Susanto. "Analisis Implementasi Sistem Keamanan Basis Data Berbasis Role-Based Access Control (RBAC) pada Aplikasi Enterprise Resource Planning." SATESI: Jurnal Sains Teknologi dan Sistem Informasi 5, no. 1 (2025): 105–16. https://doi.org/10.54259/satesi.v5i1.3997.
Pełny tekst źródłaNyame, Gabriel, and Zhiguang Qin. "Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework." Information 11, no. 6 (2020): 334. http://dx.doi.org/10.3390/info11060334.
Pełny tekst źródłaOoi, Soo Liang, Peter S. Micalos, and Sok Cheon Pak. "Modified Rice Bran Arabinoxylan by Lentinus edodes Mycelial Enzyme as an Immunoceutical for Health and Aging—A Comprehensive Literature Review." Molecules 28, no. 17 (2023): 6313. http://dx.doi.org/10.3390/molecules28176313.
Pełny tekst źródłaOoi, Soo Liang, Sok Cheon Pak, Peter S. Micalos, et al. "The Health-Promoting Properties and Clinical Applications of Rice Bran Arabinoxylan Modified with Shiitake Mushroom Enzyme—A Narrative Review." Molecules 26, no. 9 (2021): 2539. http://dx.doi.org/10.3390/molecules26092539.
Pełny tekst źródłaLewis, John E., Steven E. Atlas, Oscar L. Higuera, et al. "The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease." Evidence-Based Complementary and Alternative Medicine 2018 (May 3, 2018): 1–10. http://dx.doi.org/10.1155/2018/1751583.
Pełny tekst źródłade Carvalho Junior, Marcelo Antonio, and Paulo Bandiera-Paiva. "Health Information System Role-Based Access Control Current Security Trends and Challenges." Journal of Healthcare Engineering 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/6510249.
Pełny tekst źródłaMitra, Barsha, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri. "Migrating from RBAC to temporal RBAC." IET Information Security 11, no. 5 (2017): 294–300. http://dx.doi.org/10.1049/iet-ifs.2016.0258.
Pełny tekst źródłaDarwish, Wesam, and Konstantin Beznosov. "Analysis of ANSI RBAC Support in EJB." International Journal of Secure Software Engineering 2, no. 2 (2011): 25–52. http://dx.doi.org/10.4018/jsse.2011040102.
Pełny tekst źródłaZhang, Jian Hua, and Qiang Liu. "An Administration Iteration Problem and its Solution when Deploying the RBAC Model." Applied Mechanics and Materials 263-266 (December 2012): 1584–87. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1584.
Pełny tekst źródłaZhao, Yu Lan, and Chun Feng Jiang. "Research of Access Control Models in Personal Networks." Advanced Materials Research 989-994 (July 2014): 4751–54. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4751.
Pełny tekst źródłaLewis, John E., Steven E. Atlas, Oscar L. Higuera, et al. "Corrigendum to “The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease”." Evidence-Based Complementary and Alternative Medicine 2020 (April 7, 2020): 1–10. http://dx.doi.org/10.1155/2020/9575878.
Pełny tekst źródłaSri, kanth Mandru. "Role-Based Access Control (RBAC) in Modern IAM Systems: A study on the effectiveness and challenges of RBAC in managing access to resources in large organizations." European Journal of Advances in Engineering and Technology 6, no. 4 (2019): 57–64. https://doi.org/10.5281/zenodo.13353634.
Pełny tekst źródłaShanu Khare, Payal Thakur, Navjot Singh Talwandi, and Vikash Yadav. "Securing Microservice Architecture: Load Balancing and Role-Based Access Control." International Journal on Engineering Artificial Intelligence Management, Decision Support, and Policies 1, no. 1 (2024): 21–28. https://doi.org/10.63503/j.ijaimd.2024.7.
Pełny tekst źródłaTaresh Mehra. "The Critical Role of Role-Based Access Control (RBAC) in securing backup, recovery, and storage systems." International Journal of Science and Research Archive 13, no. 1 (2024): 1192–94. http://dx.doi.org/10.30574/ijsra.2024.13.1.1733.
Pełny tekst źródłaWainer, Jacques, Paulo Barthelmess, and Akhil Kumar. "W-RBAC — A Workflow Security Model Incorporating Controlled Overriding of Constraints." International Journal of Cooperative Information Systems 12, no. 04 (2003): 455–85. http://dx.doi.org/10.1142/s0218843003000814.
Pełny tekst źródłaAbdulkadir, .A. Adamu* Dong Wang Abdul-Fatou Adam. "ACCESS CONTROL IN DISTRIBUTED HEALTHCARE INFORMATION: THE KEY FEATURES." Global Journal of Engineering Science and Research Management 4, no. 4 (2017): 53–58. https://doi.org/10.5281/zenodo.569969.
Pełny tekst źródłaLiu, Gang, Runnan Zhang, Huimin Song, Can Wang, Jinhui Liu, and Aijun Liu. "Ts-RBAC: A RBAC model with transformation." Computers & Security 60 (July 2016): 52–61. http://dx.doi.org/10.1016/j.cose.2016.03.006.
Pełny tekst źródłaAftab, Muhammad Umar, Zhiguang Qin, Negalign Wake Hundera, et al. "Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model." Symmetry 11, no. 5 (2019): 669. http://dx.doi.org/10.3390/sym11050669.
Pełny tekst źródłaMuehlbacher, Joerg, and Christian Praher. "DS RBAC - Dynamic Sessions in Role Based Access Control." JUCS - Journal of Universal Computer Science 15, no. (3) (2009): 538–54. https://doi.org/10.3217/jucs-015-03-0538.
Pełny tekst źródłaPanzarini, Elisa, Valentina Inguscio, and Luciana Dini. "Overview of Cell Death Mechanisms Induced by Rose Bengal Acetate-Photodynamic Therapy." International Journal of Photoenergy 2011 (2011): 1–11. http://dx.doi.org/10.1155/2011/713726.
Pełny tekst źródłaLIN, CHIH-MIN, ANG-BUNG TING, CHUN-FEI HSU, and CHAO-MING CHUNG. "ADAPTIVE CONTROL FOR MIMO UNCERTAIN NONLINEAR SYSTEMS USING RECURRENT WAVELET NEURAL NETWORK." International Journal of Neural Systems 22, no. 01 (2012): 37–50. http://dx.doi.org/10.1142/s0129065712002992.
Pełny tekst źródłaRashid, Mamoon, and Er Rishma Chawla. "Securing Data Storage By Extending Role-Based Access Control." International Journal of Cloud Applications and Computing 3, no. 4 (2013): 28–37. http://dx.doi.org/10.4018/ijcac.2013100103.
Pełny tekst źródłaSchupfer, Emily, Soo Liang Ooi, Thomas C. Jeffries, Shaoyu Wang, Peter S. Micalos, and Sok Cheon Pak. "Changes in the Human Gut Microbiome during Dietary Supplementation with Modified Rice Bran Arabinoxylan Compound." Molecules 28, no. 14 (2023): 5400. http://dx.doi.org/10.3390/molecules28145400.
Pełny tekst źródłaWang, Tao, and Qiang Wu. "Role Minimization Optimization Algorithm Based on Concept Lattice Factor." Mathematics 11, no. 14 (2023): 3047. http://dx.doi.org/10.3390/math11143047.
Pełny tekst źródłaVerma, Prof Saurabh, Prof Ranu Sahu, Saloni Chourey, and Radhika Chourasiya. "Comparative Study of Healthcare Systems using RBAC Alone versus Integrating RBAC with Digital Watermarking for Enhanced Data Security." International Journal of Innovative Research in Science,Engineering and Technology 12, no. 04 (2023): 4675–79. http://dx.doi.org/10.15680/ijirset.2023.1204384.
Pełny tekst źródłaKUHLMANN, MIRCO, KARSTEN SOHR, and MARTIN GOGOLLA. "Employing UML and OCL for designing and analysing role-based access control." Mathematical Structures in Computer Science 23, no. 4 (2013): 796–833. http://dx.doi.org/10.1017/s0960129512000266.
Pełny tekst źródłaVinay Reddy Male. "Decoding Role-Based Access Control (RBAC)." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2082–90. https://doi.org/10.32628/cseit251112211.
Pełny tekst źródłaSatyanarayana Asundi, Sarat Piridi. "Enhancing Role-Based Access Control (RBAC) in Dataverse for Secure Enterprise Applications – Analyzing Advanced Security Models and Governance for Power Apps and Dynamics 365 CRM." Journal of Information Systems Engineering and Management 10, no. 41s (2025): 1214–24. https://doi.org/10.52783/jisem.v10i41s.9747.
Pełny tekst źródłaDaisy Sharmah. "Integrating Honey Bee Load Balancing Algorithm with Role-Based Access Control in Blockchain Technology to Minimise Response Time in Cloud Computing." Journal of Information Systems Engineering and Management 10, no. 33s (2025): 702–13. https://doi.org/10.52783/jisem.v10i33s.5629.
Pełny tekst źródłaDamiani, Maria Luisa, Elisa Bertino, Barbara Catania, and Paolo Perlasca. "GEO-RBAC." ACM Transactions on Information and System Security 10, no. 1 (2007): 2. http://dx.doi.org/10.1145/1210263.1210265.
Pełny tekst źródłaSong, Wan Li, Hai Fei Zhang, Wei Feng Wu, and Wen Jie He. "An Improved RBAC Model and its Application in Development of Information System." Advanced Materials Research 989-994 (July 2014): 4650–53. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.4650.
Pełny tekst źródłaDas, Dipta, Andrew Walker, Vincent Bushong, Jan Svacina, Tomas Cerny, and Vashek Matyas. "On automated RBAC assessment by constructing a centralized perspective for microservice mesh." PeerJ Computer Science 7 (February 1, 2021): e376. http://dx.doi.org/10.7717/peerj-cs.376.
Pełny tekst źródłaOoi, Soo Liang, Peter S. Micalos, and Sok Cheon Pak. "Modified rice bran arabinoxylan as a nutraceutical in health and disease—A scoping review with bibliometric analysis." PLOS ONE 18, no. 8 (2023): e0290314. http://dx.doi.org/10.1371/journal.pone.0290314.
Pełny tekst źródłaFragkos, Georgios, Jay Johnson, and Eirini Eleni Tsiropoulou. "Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations." Energies 15, no. 17 (2022): 6375. http://dx.doi.org/10.3390/en15176375.
Pełny tekst źródłaYang, Jiyong, Xiajiong Shen, Wan Chen, Qiang Ge, Lei Zhang, and HaoLin Chen. "A Model Study on Collaborative Learning and Exploration of RBAC Roles." Wireless Communications and Mobile Computing 2021 (June 24, 2021): 1–9. http://dx.doi.org/10.1155/2021/5549109.
Pełny tekst źródłaAttia, Hasiba, Laid Kahloul, and Saber Benharzallah. "A New Hybrid Access Control Model for Security Policies in Multimodal Applications Environments." JUCS - Journal of Universal Computer Science 24, no. (4) (2018): 392–416. https://doi.org/10.3217/jucs-024-04-0392.
Pełny tekst źródłaTian, Wan Li, Lian Zhong Liu, and Meng Liu. "Roles Generation for Applications in RBAC Model." Applied Mechanics and Materials 411-414 (September 2013): 35–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.35.
Pełny tekst źródłaDeng, Ji Qiu, Xiao Qing Luo, and Huang Ling Gu. "The Design and Implementation of G-RBAC Model in Map Permission." Advanced Materials Research 268-270 (July 2011): 1457–61. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1457.
Pełny tekst źródłaZhang, Wei, and Zuo Quan Lin. "An ASP Based Approach of Inter-Domain Role Mapping." Advanced Materials Research 706-708 (June 2013): 1843–46. http://dx.doi.org/10.4028/www.scientific.net/amr.706-708.1843.
Pełny tekst źródłaV, Shashidhar, and Venkatesulu D. "Anomaly Detection for RBAC Systems in UNIX/LINUX Environment with User Behavior." International Journal of Engineering & Technology 7, no. 4.5 (2018): 24. http://dx.doi.org/10.14419/ijet.v7i4.5.20002.
Pełny tekst źródłaArun Kumar Akuthota. "Role-Based Access Control (RBAC) in Modern Cloud Security Governance: An In-depth Analysis." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 3297–311. https://doi.org/10.32628/cseit25112793.
Pełny tekst źródłaIshiaku, Awwal, and Christian Bassey. "Optimizing Synchronization and Role-Based Access Control in Double-Surgeon Telesurgery Cockpits." Journal of Internet Services and Information Security 15, no. 1 (2025): 330–47. https://doi.org/10.58346/jisis.2025.i1.021.
Pełny tekst źródłaRao, K. Rajesh, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, and Muttukrishnan Rajarajan. "Role recommender-RBAC: Optimizing user-role assignments in RBAC." Computer Communications 166 (January 2021): 140–53. http://dx.doi.org/10.1016/j.comcom.2020.12.006.
Pełny tekst źródłaAl-hadhrami, Nasser, Benjamin Aziz, and Lotfi ben Othmane. "An Incremental B-Model for RBAC-Controlled Electronic Marking System." International Journal of Secure Software Engineering 7, no. 2 (2016): 37–64. http://dx.doi.org/10.4018/ijsse.2016040103.
Pełny tekst źródłaZhang, Xianghui, Zuoping Zhu, Jianxin Sui, Yao Huang, and Chaojun Zuo. "A dual-role hierarchical RBAC extended security model based on department attributes and its application." E3S Web of Conferences 360 (2022): 01051. http://dx.doi.org/10.1051/e3sconf/202236001051.
Pełny tekst źródłaAli, Karriem H., Angelica B. Melillo, Susanna M. Leonard, et al. "An open-label, randomized clinical trial to assess the immunomodulatory activity of a novel oligosaccharide compound in healthy adults." Functional Foods in Health and Disease 2, no. 7 (2012): 265. http://dx.doi.org/10.31989/ffhd.v2i7.84.
Pełny tekst źródłaCharan Shankar Kummarapurugu. "Role-based access control in cloud-native applications: Evaluating best practices for secure multi-tenant Kubernetes environments." World Journal of Advanced Research and Reviews 1, no. 2 (2019): 045–53. http://dx.doi.org/10.30574/wjarr.2019.1.2.0008.
Pełny tekst źródła