Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of role mining
Role-Based Access Control (RBAC) is the most widely used model for advanced access
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
control deployed in diverse enterprises of all sizes. RBAC critically depends on defining …
Sok: context and risk aware access control for zero trust systems
Evolving computing technologies such as cloud, edge computing, and the Internet of Things
(IoT) are creating a more complex, dispersed, and dynamic enterprise operational …
(IoT) are creating a more complex, dispersed, and dynamic enterprise operational …
[HTML][HTML] Medical big data access control model based on UPHFPR and evolutionary game
R Jiang, S Han, Y Zhang, T Chen, J Song - Alexandria Engineering Journal, 2022 - Elsevier
This paper discusses how to improve the accuracy of doctors' diagnosis and how to protect
the security of patients' information. First, UPHFPR (Uncertain Probability Hesitant Fuzzy …
the security of patients' information. First, UPHFPR (Uncertain Probability Hesitant Fuzzy …
Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model
With the advent of wireless and mobile devices, many new applications are being
developed that make use of the spatio-temporal information of a user to provide better …
developed that make use of the spatio-temporal information of a user to provide better …
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database
Over the last few years, various types of access control models have been proposed for
expressing the growing needs of organizations. Out of these, there is an increasing interest …
expressing the growing needs of organizations. Out of these, there is an increasing interest …
Security analysis of ABAC under an administrative model
In the present‐day computing environment, where access control decisions are often
dependent on contextual information like the location of the requesting user and the time of …
dependent on contextual information like the location of the requesting user and the time of …
A role-based administrative model for administration of heterogeneous access control policies and its security analysis
Over the past few years, several efforts have been made to enable specification and
enforcement of flexible and dynamic access control policies using traditional access control …
enforcement of flexible and dynamic access control policies using traditional access control …
Context-aware role mining for mobile service recommendation
Finding and recommending suitable services for mobile users are increasingly important
due to the popularity of mobile Internet. While recent research has attempted to use role …
due to the popularity of mobile Internet. While recent research has attempted to use role …
ERBAC: event-driven RBAC
P Bonatti, C Galdi, D Torres - Proceedings of the 18th ACM symposium …, 2013 - dl.acm.org
Context-aware access control systems should reactively adapt access control decisions to
dynamic environmental conditions. In this paper we present an extension of the TRBAC …
dynamic environmental conditions. In this paper we present an extension of the TRBAC …
An administrative model for collaborative management of ABAC systems and its security analysis
Attribute-based Access Control (ABAC) has been emerging as a suitable choice for large
and federated enterprises due to its flexibility in expressing various types of security policies …
and federated enterprises due to its flexibility in expressing various types of security policies …