Ericsson develops and builds mobile telecommunication networks. These networks consists of a large number of equipment. Each telecommunication company has a staff of administrators appointed to manage respective networks. In this thesis, we investigate the requirements for an access control model to manage the large number of permissions and equipment in telecommunication networks. Moreover, we show that the existing models do not satisfy the identified requirements. Therefore, we propose a novel RBAC model which is adapted for these conditions. We also investigate some of the most common used commercial tools for administrating RBAC, and evaluate their effectiveness in coping with our new proposed model. However, we find the existing too...
With the increasing number of users and applications, enterprises or organizations need to effective...
The home in these days has not one computer connected to the Internet but rather a network of many d...
The increased pervasiveness of wireless mobile computing devices draws new attention to the need for...
Masteroppgave i informasjons- og kommunikasjonsteknologi 2004 - Høgskolen i Agder, GrimstadRole Bas...
Mobile ad-hoc networks support interactions and collaborations among autonomous devices by enabling ...
Technologies advanced in communication devices and wireless networks enable telecommunication networ...
Technologies advanced in communication devices and wireless networks enable telecommunication netwo...
The amount of Web applications used to replace existing traditional business applications has recent...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
International audienceTodays enterprises rely entirely on their information systems, usually connect...
Large and distributed access control systems are increasingly common, for example in health care. In...
The emerging mobile computing environment draws new attention to the need for co-ordination among ne...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Role-based Access Control (RBAC) became popular because it can handle the complicated enterprise-wi...
Access control is an important component in the security of communication systems. While cryptograph...
With the increasing number of users and applications, enterprises or organizations need to effective...
The home in these days has not one computer connected to the Internet but rather a network of many d...
The increased pervasiveness of wireless mobile computing devices draws new attention to the need for...
Masteroppgave i informasjons- og kommunikasjonsteknologi 2004 - Høgskolen i Agder, GrimstadRole Bas...
Mobile ad-hoc networks support interactions and collaborations among autonomous devices by enabling ...
Technologies advanced in communication devices and wireless networks enable telecommunication networ...
Technologies advanced in communication devices and wireless networks enable telecommunication netwo...
The amount of Web applications used to replace existing traditional business applications has recent...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
International audienceTodays enterprises rely entirely on their information systems, usually connect...
Large and distributed access control systems are increasingly common, for example in health care. In...
The emerging mobile computing environment draws new attention to the need for co-ordination among ne...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
Role-based Access Control (RBAC) became popular because it can handle the complicated enterprise-wi...
Access control is an important component in the security of communication systems. While cryptograph...
With the increasing number of users and applications, enterprises or organizations need to effective...
The home in these days has not one computer connected to the Internet but rather a network of many d...
The increased pervasiveness of wireless mobile computing devices draws new attention to the need for...