research
∙
12/29/2018
Severity Level of Permissions in Role-Based Access Control
The analysis of hidden channels of information leakage with respect to r...
research
∙
12/28/2018
A Precedent Approach to Assigning Access Rights
To design a discretionary access control policy, a technique is proposed...
research
∙
12/20/2018
User Authorization in a System with a Role-Based Access Control on the Basis of the Analytic Hierarchy Process
The problem of optimal authorization of a user in a system with a role-b...
research
∙
12/19/2018