Facilitating access to restricted functionality

PG Franklin, Z Li, JK Keiger, S Kumar - US Patent 8,606,656, 2013 - Google Patents
Techniques are described for facilitating access of computing system users to restricted
functionality, such as internal functionality of a business or other organization (eg, internal …

Research on hybrid access control strategy for smart campus platform

B Liu, Y Yang, Z Zhou - 2018 IEEE 3rd Advanced Information …, 2018 - ieeexplore.ieee.org
With the development of information technology, the emphasis of campus information work
is to ensure the safe operation of smart campus, and access control strategy is an effective …

Three-layers role-based access control framework in large financial web systems

Z Wen, B Zhou, D Wu - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
There are lots of sensitive and confidential data in financial field, such as credit card number,
stock number, fund number and so on. Therefore, top level security requirement is always …

Model kontrole pristupa u Smart Grid sistemima

D Rosić - Универзитет у Новом Саду, 2017 - nardus.mpn.gov.rs
U tezi je analiziran problem kontrole pristupa u Smart Grid sistemima. Formalno je
specificiran model kontrole pristupa za Smart Grid koji je zasnovan na unapređenju i …

Analysis of ANSI RBAC support in COM+

W Darwish, K Beznosov - Computer Standards & Interfaces, 2010 - Elsevier
We analyze access control mechanisms of the COM+ architecture and define a configuration
of the COM+ protection system in more precise and less ambiguous language than the …

Analysis of ANSI RBAC support in EJB

W Darwish, K Beznosov - International Journal of Secure Software …, 2011 - igi-global.com
This paper analyzes access control mechanisms of the Enterprise Java Beans (EJB)
architecture and defines a configuration of the EJB protection system in a more precise and …

[DOC][DOC] Design and Implementation of A-RBAC Model for Services in Distributed SOA

V Nirmalrani, P Sakthivel - … on Emerging Trends in Information and …, 2012 - researchgate.net
Traditional access control mechanism can basically meet the security requirements of
closed systems, but cannot satisfy requirements of SOA environment. We propose an …

Administering member profiles on a social networking web site

CT White, C McLean, A Mani, M Gupta… - US Patent App. 14 …, 2016 - Google Patents
BACKGROUND 0002 The approaches described in this section are approaches that could
be pursued, but not necessarily approaches that have been previously conceived or …

Assessment of the Security Threats of an Institution's Virtual Online Resources

D Endencio-Robles, RJ Robles… - … Intelligence and Soft …, 2021 - Springer
Web application is no denying one of the most effective ways to provide essential services to
clientele. However, data breach and system insecurities are increasing concern in the field …

Implement of Hierarchical Permission Based Access Control on the Web

B Liu, Z Zhou, H Li - Energy Procedia, 2011 - infona.pl
With increasingly development of web technologies, complex authorization policies need to
be securely implemented in business process, more and more sensitive data should be …