|
|
|
Yunliang Li, Zhiqiang Du, Yanfang Fu and Liangxin Liu
Information service platforms or management information systems of various institutions or sectors of enterprises are gradually interconnected to form a multi-domain environment. A multi-domain environment is convenient for managers to supervise and mana...
ver más
|
|
|
|
|
|
|
Aleksandar To?ic, Niki Hrovatin and Jernej Vicic
In the past two decades, technological advancements in smart devices, IoT, and smart sensors have paved the way towards numerous implementations of indoor location systems. Indoor location has many important applications in numerous fields, including str...
ver más
|
|
|
|
|
|
|
Gabriel Nyame and Zhiguang Qin
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations. As a socio-technical concept, the notion of role in RBAC has been overemphasized, while very little a...
ver más
|
|
|
|
|
|
|
Gabriel Nyame, Zhiguang Qin, Kwame Opuni-Boachie Obour Agyekum and Emmanuel Boateng Sifah
Access control has become problematic in several organizations because of the difficulty in establishing security and preventing malicious users from mimicking roles. Moreover, there is no flexibility among users in the participation in their roles, and ...
ver más
|
|
|
|
|
|
|
Qasem Kharma,Nidal M Turab,Qusai Shambour,Mohammad Hassan
Pág. pp. 44 - 60
Smart mobile devices and cloud computing are widely used today. While mobile and portable devices have different capabilities, architectures, operating systems, and communication channels than one another, government data are distributed over heterogeneo...
ver más
|
|
|
|
|
|
|
Wei Sun, Shiwei Wei, Huaping Guo and Hongbing Liu
Role-based access control (RBAC), which has been regarded as one of the most popular access-control mechanisms, is featured by the separation-of-duty constraints, mutually exclusive constraints, and the least-privileges principle. Role mining, a bottom-u...
ver más
|
|
|
|
|
|
|
Rongyue Zheng, Jianlin Jiang, Xiaohan Hao, Wei Ren, Feng Xiong and Tianqing Zhu
A building information model (BIM) is of upmost importance with a full life-time cycle in architecture engineering and construction industry. Smart construction relies on BIM to manipulate information flow, data flow, and management flow. Currently, BIM ...
ver más
|
|
|
|
|
|
|
Wei Sun, Hui Su and Hongbing Liu
Role-based access control (RBAC) is one of the most popular access-control mechanisms because of its convenience for management and various security policies, such as cardinality constraints, mutually exclusive constraints, and user-capability constraint...
ver más
|
|
|
|
|
|
|
Khaled Shuaib, Ezedin Barka, Nedaa Al Hussien, Mohammed Abdel-Hafez and Mahmoud Alahmad
In this paper, we investigate how Cognitive Radio as a means of communication can be utilized to serve a smart grid deployment end to end, from a home area network to power generation. We show how Cognitive Radio can be mapped to integrate the possible d...
ver más
|
|
|
|
|
|
|
Raimundas Matulevicius,Henri Lakk
Pág. 35 - 62
Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users. While the benefits of RBAC ar...
ver más
|
|
|
|