An environment-based RBAC model for internal network

Y Fu, Y Liu, D Liu, F Lou, K Yan - 2016 First IEEE International …, 2016 - ieeexplore.ieee.org
Role-based access control is widely used in information system of internal network, but there
are still many limitations when there is a large number of roles and objects in the system …

FARBAC: A fine-grained administrative RBAC model

X Jiang, M Su, W Shen - 2015 International Conference and …, 2015 - ieeexplore.ieee.org
Aiming at the deficiency of traditional Role Based Access Control model in practical
application, this paper puts forward an improved RBAC administrative model on the basis of …

Enhancing role management in role-based access control

X Feng, B Ge, Y Sun, Z Wang… - 2010 3rd IEEE …, 2010 - ieeexplore.ieee.org
Role-Based Access Control (RBAC) has been widely applied to authorize certain users to
access certain data or resources within complex systems. Several issues arose during the …

Method of information system authority control based on RBAC in web environment

Y Zhang, M Wu, Z Wan - 2010 2nd international conference on …, 2010 - ieeexplore.ieee.org
Method of information system authority control based on rbac in web environment Page 1
542 Method of Information System Authority Control Based on RBAC in Web Environment …

Context active rbac and its applications

YZ He, Z Han, Y Du - 2008 International Symposium on …, 2008 - ieeexplore.ieee.org
Role based access control (RBAC) model provides a means of efficient management of
access control policy in large scale and widely distributed environment. With policy-neutral …

Research and Implementation of Role-Based Access Control Model Based on Partition Number

C Jinyu, Z Tong - 2009 Second International Symposium on …, 2009 - ieeexplore.ieee.org
The role-based access control (RBAC) model has garnered great interest in the security
community due to the flexible and secure nature of its applicability to the complex and …

An Introspective Study on Dynamic Role-Centric RBAC Models

A Suganthy, VP Venkatesan - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
With the advent of internet and its related technologies, the organizations are more
concerned in providing security to their resources. Access control models helps in providing …

An evaluation of role based access control towards easier management compared to tight security

MA Habib, M Ahmad, N Mahmood… - Proceedings of the …, 2017 - dl.acm.org
Role-based access control (RBAC) is a widely-used protocol to design and build an access
control for providing the system security regarding authorization. Even though in the context …

Atom-role-based access control model

W Cai, R Huang, X Hou, G Wei, S Xiao… - … on Information and …, 2012 - search.ieice.org
Role-based access control (RBAC) model has been widely recognized as an efficient
access control model and becomes a hot research topic of information security at present …

Obligations for role based access control

G Zhao, D Chadwick, S Otenko - 21st International Conference …, 2007 - ieeexplore.ieee.org
Role based access control has been widely researched in security critical systems.
Conventional role based access control is a passive model, which makes authorization …