New technologies as cloud computing and internet of things (IoT) has expanded the range of multimodal applications. This expansion, in several computing and heterogeneous environments, makes access control an important issue in multimodal applications. Indeed, a variety of access control models have been developed to address different aspects of security problems. The two most popular basic models are: Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC). The both models RBAC and ABAC have their specific features and they can complement each other. For that, providing a hybrid model which considers both concepts "roles" as well as "attributes" has become an important research topic. This paper proposes a new access con...
In mobile wireless sensor network, coverage and energyCloud computing is a type of internet-based co...
Cloud computing is becoming increasingly popular among all types of companies due to its inherent be...
Recently there has been considerable interest in role-based access control (RBAC) as an alternative,...
Abstract. Attribute-based access control (ABAC) and role-based access control (RBAC) are currently t...
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every aspect...
Part 6: Access Control and Usage PoliciesInternational audienceRole-based access control (RBAC) and ...
In this paper, we propose an access control architecture for IoT systems by developing a hybrid mode...
The area of smart homes is one of the most popular for deploying smart connected devices. One of the...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
In recent decades, the number of researches on access control and user actions in computer systems h...
With the increasing number of users and applications, enterprises or organizations need to effective...
Sharing of information is fundamental to modern computing environments across many application domai...
AbstractThe increase in Internet-connected physical devices offers new possibilities and opportuniti...
Abstract--The cloud platforms are consisted of a larger number of servers along with networking and ...
Nowadays, with the exception of very small companies, almost all companies and institutions are hier...
In mobile wireless sensor network, coverage and energyCloud computing is a type of internet-based co...
Cloud computing is becoming increasingly popular among all types of companies due to its inherent be...
Recently there has been considerable interest in role-based access control (RBAC) as an alternative,...
Abstract. Attribute-based access control (ABAC) and role-based access control (RBAC) are currently t...
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every aspect...
Part 6: Access Control and Usage PoliciesInternational audienceRole-based access control (RBAC) and ...
In this paper, we propose an access control architecture for IoT systems by developing a hybrid mode...
The area of smart homes is one of the most popular for deploying smart connected devices. One of the...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
In recent decades, the number of researches on access control and user actions in computer systems h...
With the increasing number of users and applications, enterprises or organizations need to effective...
Sharing of information is fundamental to modern computing environments across many application domai...
AbstractThe increase in Internet-connected physical devices offers new possibilities and opportuniti...
Abstract--The cloud platforms are consisted of a larger number of servers along with networking and ...
Nowadays, with the exception of very small companies, almost all companies and institutions are hier...
In mobile wireless sensor network, coverage and energyCloud computing is a type of internet-based co...
Cloud computing is becoming increasingly popular among all types of companies due to its inherent be...
Recently there has been considerable interest in role-based access control (RBAC) as an alternative,...