15   Artículos

 
en línea
Yunliang Li, Zhiqiang Du, Yanfang Fu and Liangxin Liu    
Information service platforms or management information systems of various institutions or sectors of enterprises are gradually interconnected to form a multi-domain environment. A multi-domain environment is convenient for managers to supervise and mana... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Gabriel Nyame, Zhiguang Qin, Kwame Opuni-Boachie Obour Agyekum and Emmanuel Boateng Sifah    
Access control has become problematic in several organizations because of the difficulty in establishing security and preventing malicious users from mimicking roles. Moreover, there is no flexibility among users in the participation in their roles, and ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Qasem Kharma,Nidal M Turab,Qusai Shambour,Mohammad Hassan     Pág. pp. 44 - 60
Smart mobile devices and cloud computing are widely used today. While mobile and portable devices have different capabilities, architectures, operating systems, and communication channels than one another, government data are distributed over heterogeneo... ver más

 
en línea
Gabriel Nyame and Zhiguang Qin    
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations. As a socio-technical concept, the notion of role in RBAC has been overemphasized, while very little a... ver más
Revista: Information    Formato: Electrónico

 
en línea
Wei Sun, Shiwei Wei, Huaping Guo and Hongbing Liu    
Role-based access control (RBAC), which has been regarded as one of the most popular access-control mechanisms, is featured by the separation-of-duty constraints, mutually exclusive constraints, and the least-privileges principle. Role mining, a bottom-u... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Wei Sun, Hui Su and Hongbing Liu    
Role-based access control (RBAC) is one of the most popular access-control mechanisms because of its convenience for management and various security policies, such as cardinality constraints, mutually exclusive constraints, and user-capability constraint... ver más
Revista: Information    Formato: Electrónico

 
en línea
Khaled Shuaib, Ezedin Barka, Nedaa Al Hussien, Mohammed Abdel-Hafez and Mahmoud Alahmad    
In this paper, we investigate how Cognitive Radio as a means of communication can be utilized to serve a smart grid deployment end to end, from a home area network to power generation. We show how Cognitive Radio can be mapped to integrate the possible d... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Raimundas Matulevicius,Henri Lakk     Pág. 35 - 62
Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users. While the benefits of RBAC ar... ver más
Revista: Complex Systems Informatics and Modeling Quarterly    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »