Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 4

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  RBAC
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
PL
Przedstawiono sposób zapewnienia cyberbezpieczeństwa na poziomie przekaźników zabezpieczeniowych, sposoby ochrony przed nieautoryzowanym dostępem do urządzeń lub błędami pracowników oraz przywołano użyteczne w tym zakresie normy, publikacje i grupy robocze.
EN
The article presents, how to ensure cyber-security in world of protection relays, ways of protection against unauthorized access to facilities or staff errors and useful standards, publications and working groups.
EN
Interconnectivity of computers in network environments increases the risk of security breach in distributed computer systems. In many system architectures security is provided only in application space. This paper proposes an operating system enforced access control policy where Role Based Access Control and Privilege Management Infrastructure(PMI) based on X.509 attribute certificates are integrated into the operating system kernel. The resulting architecture tries to leverage the cost of maintaining the security policy by providing an easy way for managing security role assignments to users of the system.
3
Content available remote Application of deontic logic in role-based access control
EN
The paper presents a short overview of the foundations of the Role-Based Access Control Modal Model and its properties. In particular, the translation of these model formulae to the first-order logic formulae in a form of Horn's clauses is analysed. The automation of processes and mechanisms related to access control on the basis of logical automated reasoning and the PROLOG language are described.
4
Content available remote The implementation of the RBAC model of the UML-Java platform
EN
The role-based access control (RBAC) model is one of the policies used to access control in the information systems. This powerful technology is very useful for managing the security of the information systems of the enterprises. In order to utilise its potential, the roles - the main component of this model - have to be properly constructed to reflect the organisational access control policy and the needs of the system. This requires the development of the components of the RBAC model in the correct way and implementation with the use of suitable tools. This paper presents the extension of the standard RBAC model and the implementation of this extension. The proposed approach is realised using the Unified Modelling Language (UML). The UML language was chosen because nowadays it is the standard tool, properly reflecting the description of the information system and its needs.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.