In this paper, we try to reduce the number of transactions unnecessarily aborting. We newly propose a modified read-abortion (MRA) protocol where only maximal ...
A modified read abortion (MRA) protocol is proposed which uses a new condition on maximal roles of role sets which considers only maximal roles which ...
Evaluation of a Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the RBAC Model. Chapter © 2019. A Synchronization Protocol to Prevent ...
In this paper, we newly propose a modified read abortion (MRA) protocol which uses a new condition on maximal roles of role sets. In addition, we consider only ...
Peer Review, Peer reviewed. Title, Evaluation of a Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the RBAC Model. Contribution Type.
People also ask
Mar 11, 2016 · The role-based access control (RBAC) model is widely used to make information systems secure. Even if every access request is authorized, ...
Missing: Maximal | Show results with:Maximal
It means, if a subject granted the role r i manipulates objects before another subject granted the role r j , no illegal information flow occur.
A new safety concept of a role and an FRWA-RS (FRWA with role safety) protocol is proposed to prevent illegal information flow in information systems and ...
This paper presents the Identity Authentication and Capability basedAccess Control (IACAC) model with protocol evaluation and performanceanalysis. To protect ...
Nakamura et al. [19] developed a synchronization protocol to prevent illegal flows in RBAC systems, where operations are blocked if they illegally write or�...