Llwytho...

Deploying ABAC policies using RBAC Systems

The flexibility, portability and identity-less access control features of Attribute Based Access Control(ABAC) make it an attractive choice to be employed in many application domains. However, commercially viable methods for implementation of ABAC do not exist while a vast majority of organizations...

Disgrifiad llawn

Wedi'i Gadw mewn:
Manylion Llyfryddiaeth
Cyhoeddwyd yn:J Comput Secur
Prif Awduron: Batra, Gunjan, Atluri, Vijayalakshmi, Vaidya, Jaideep, Sural, Shamik
Fformat: Artigo
Iaith:Inglês
Cyhoeddwyd: 2019
Pynciau:
Mynediad Ar-lein:https://ncbi.nlm.nih.gov/pmc/articles/PMC6953980/
https://ncbi.nlm.nih.gov/pubmed/31929684
https://ncbi.nlm.nih.govhttp://dx.doi.org/10.3233/JCS-191315
Tagiau: Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!