Showing 1 - 13 results of 13 for search 'role-based algorithm', query time: 0.22s Refine Results
  1. 1

    IRMAOC: an interpretable role mining algorithm based on overlapping clustering by Yaqi Yang, Jun’e Li, Tao Zhang, Lu Chen, Guirong Huang, Zhuo Lv

    Published 2025-01-01
    “…This paper proposes an Interpretable Role Mining Algorithm Based on Overlapping Clustering (IRMAOC). …”
    Get full text
    Article
  2. 2

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  3. 3

    Role-based fine-grained delegation constraint framework in collaborative environments by LIU Wei1, CAI Jia-yong1, HE Ye-ping1

    Published 2008-01-01
    “…A role-based delegation constraint method was introduced by separating role into two parts for fine-grained controlling. …”
    Get full text
    Article
  4. 4

    Reconfiguring Role-Based Access Control via Role Clustering by Osman Durdag, Ahmet Coskuncay

    Published 2025-01-01
    “…Role-based access control (RBAC) systems have become a widely used and accepted method by many organizations today due to their efficiency and ease of management. …”
    Get full text
    Article
  5. 5

    Roles query algorithm in cloud computing environment based on user require by YANG Liu, TANG Zhuo, LI Ren-fa, ZHANG Zong-li

    Published 2011-01-01
    “…Roles based access control model CARBAC for cloud computing environment was proposed.Roles in the model include user roles and resources owner roles,the latter were called administrator roles.For the resources owner roles assigning the roles to the users,roles query algorithm in the hybrid hierarchies based on users’ access require was proposed.Through this algorithm,for the certain privileges set,this model could choose the least roles set to be assigned to the users.The simulation experiment indicates that for the mass user access,this algorithm can reduce the roles quan-tity,shorten the authorization procedure,and advance the system efficiency.…”
    Get full text
    Article
  6. 6

    Research on automatic processing system of financial information in colleges and universities based on NLP-KG fusion algorithm by Jin Lei, Mengke Wei, Yiwen She, Weixia Wang

    Published 2025-12-01
    “…The existing mechanisms ensure security and privacy from multiple aspects: access control (using multi-factor identity authentication and role-based permission management), data encryption (SSL/TLS encryption protocol and AES algorithms are used for transmission and storage, respectively), data backup and recovery (regular backup, off-site storage, and recovery drills), audit and monitoring (detailed recording of operations and real-time monitoring of network traffic, etc.). …”
    Get full text
    Article
  7. 7

    Enhancing confidentiality and access control in electronic health record systems using a hybrid hashing blockchain framework by D. Gowtham Chakravarthy, R. Gopi, Sivaram Murugan, Emerson Raja Joseph

    Published 2025-08-01
    “…The system shows robust resistance to illegal access compared to traditional role-based access control systems.…”
    Get full text
    Article
  8. 8

    Improved Private Data Protection Scheme for Blockchain Smart Contracts by Sheng Hu

    Published 2023-01-01
    “…Secondly, we incorporate the role-based access control (RBAC) model with smart contracts to finely divide user privileges, construct an interdomain role-based access control (ID-RBAC) model, and provide detailed access authentication process designs for both within and between domains. …”
    Get full text
    Article
  9. 9

    A blockchain-based access control method for large-scale electronic medical records by Zhen Chu, Wangjie Qiu, Tianyu Lei, Jinchun He, Qinnan Zhang

    Published 2025-05-01
    “…The framework first introduces a real-time access behavior analysis algorithm. It then integrates Ethereum smart contract technology with the RBAC model to construct high-performance, scalable access control contracts. …”
    Get full text
    Article
  10. 10

    Secure Sharing of Electronic Medical Records Based on Blockchain by Song Luo, N. Han, Tan Hu, YuHua Qian

    Published 2024-01-01
    “…The scheme uses an SM encryption algorithm to encrypt the medical data in the system. …”
    Get full text
    Article
  11. 11

    Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection by Changyu Liu, Bin Lu, Huiling Li

    Published 2014-01-01
    “…However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. …”
    Get full text
    Article
  12. 12

    Innovative approaches to standardisation in forest commodity science: Trends and prospects by O. Sytnyk, I. Kimeichuk

    Published 2025-06-01
    “…The study revealed modern innovative approaches to standardisation in forest commodity science, among which digital technologies, blockchain systems, artificial intelligence algorithms and remote monitoring tools played a key role. …”
    Get full text
    Article
  13. 13

    Automated attendance management with RFID and geospatial visualization by Jilbert C. Bati-On, Kyle P. Kuizon, Krischel Ann Y. Catulpos, Johnloyd B. Bonghanoy, Jose Jr. Costillas Agoylo

    Published 2025-01-01
    “…Conclusion: The integration of genetic algorithms and facial recognition in a web-based scheduling system demonstrated improvements in efficiency, accuracy, and data security. …”
    Get full text
    Article