Zobrazeno 1 - 10
of 1 790
pro vyhledávání: '"RBAC"'
Autor:
Ezichi Mpamugo, Godwin Ansa
Publikováno v:
Journal of Information Systems and Informatics, Vol 6, Iss 3, Pp 1872-1899 (2024)
In today's dynamic networking environment, securing access to resources has become increasingly challenging due to the growth and progress of connected devices. This study explores the integration of Role-Based Access Control (RBAC) and OAuth 2.0 pro
Externí odkaz:
https://doaj.org/article/50b444e89d8745eeb9334c44c577a9ee
Autor:
Halyna Huzenko, Leonid Galchynsky
Publikováno v:
Proceedings of the International Conference on Applied Innovations in IT, Vol 11, Iss 2, Pp 39-46 (2023)
The article discusses the structure of the Ronin protocol and its components, focusing on consensus mechanisms and validators. The purpose of the study was to identify the vulnerability of the protocol and to develop methods for its resolution. It wa
Externí odkaz:
https://doaj.org/article/28b11f300ea142cb857dbc00622e4112
Autor:
K. Roslin Dayana, P. Shobha Rani
Publikováno v:
Automatika, Vol 64, Iss 4, Pp 1072-1079 (2023)
Cloud data storage lets customers store vast amounts of data cheaply on demand. Cryptographic role-based access control (RBAC) systems preserve cloud data privacy by restricting access to users. This study develops a trust model to reason about and i
Externí odkaz:
https://doaj.org/article/3bbe6036638748d89d513dbd583b97d6
Publikováno v:
Frontiers in Mechanical Engineering, Vol 9 (2023)
Radio Frequency Identification (RFID) is a contactless technology that has developed over the 90s and 20th centuries. It employs electromagnetic or electrostatic coupling in the radio frequency part of the electromagnetic spectrum to uniquely identif
Externí odkaz:
https://doaj.org/article/e6aab96d2bac42e983b2fdc17d10ded7
Publikováno v:
IEEE Access, Vol 11, Pp 106315-106333 (2023)
The Internet of Things (IoT) connects many objects and allows continuous communication and data sharing has emerged as a revolutionary technology. However, expanding IoT devices has raised concerns regarding data security and access control. Traditio
Externí odkaz:
https://doaj.org/article/cdfe07cea8dc4cbabde2ea952e071ba1
Publikováno v:
IEEE Access, Vol 11, Pp 86872-86894 (2023)
System for Cross-domain Identity Management (SCIM) is a schema and protocol to exchange identity data across cloud-based applications utilizing a Representational State Transfer (REST) Application Programming Interface (API). Since it quickly gained
Externí odkaz:
https://doaj.org/article/ca700f18db654ecda6713f4b12698529
Publikováno v:
Case Studies in Construction Materials, Vol 18, Iss , Pp e02184- (2023)
In recent years crushing waste brick to produce recycled brick aggregates (RBAs) has become a viable solution for reducing environmental pollution and addressing the natural resource shortage in civil engineering. To promote the widespread use of the
Externí odkaz:
https://doaj.org/article/682be90b4edf4fcabaf828efb92e5ebb
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Garcia, Joe, Shannon, Russell, Jacobson, Aaron, Mosca, William, Burger, Michael, Maldonado, Roberto
Publikováno v:
Journal of Defense Analytics and Logistics, 2021, Vol. 5, Issue 1, pp. 46-76.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/JDAL-03-2020-0006
Publikováno v:
Frontiers in Computational Neuroscience, Vol 16 (2022)
The role-based access control model (RBAC) is an access control approach oriented to enterprise security policy, which plays a leading role in the field of access control due to its good applicability and flexibility. However, as the scale of access
Externí odkaz:
https://doaj.org/article/924da2bbc862445f98eaeb469f45534c