The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper expounds the shortages of RBAC96 model in the aspects of the authorization, access rules, and fine-grained access control in the practical application; and analyses the shortcomings of the extended role-based access control model (E-RBAC), which integrates the authorization of users and roles, one new expansion model was presented and achieved. The new model not only can achieve fine-grained...
In the present world of communication and information interchange where more and more users are bound to use the same services and data with different access levels, the need for providing protection against potential breach of secured data has gained profound importance. Some of the common services are virtual private network (VPN), remote access server (RAS), Web server, mail server etc. In the...
An access control model based on credibility is proposed. The Community Authorization Service (CAS) is an authentication technology which allows service providers to delegate some policy authority to the virtual organization. While in open distributed systems, provider join or leave the domain frequently, so access-control policy in the server changes quickly. To reduce the server load, threshold...
Access control is an important security measure in workflow system. Based on the analysis of many access control models, by emphasizing the weakness existing in the present workflow system, a new access control model is proposed with the introduction of task set, task flow, time constraint and the formalized definition and relevant algorithm. It overcomes the shortcomings of the traditional model...
In order to improve the data access efficiency and enhance the security in IT systems, a layered access control model with classified distributed storage in distributed environment is presented. In the model, information is stored in numbers of physical distributed storage nodes. The storage architecture is logically organized into four classes, which includes active data storage, static data storage,...
Today, access control security for storage area networks (zoning and masking) is implemented by mechanisms that are inherently insecure, and are tied to the physical network components. However, what we want to secure is at a higher logical level independent of the transport network; raising security to a logical level simplifies management, provides a more natural fit to a virtualized infrastructure,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.