53 Reads
·
73 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
53 Reads
·
73 Citations
... Based on RBAC [16], many models have been proposed, like RBAC96 [17], ARBAC97 [18], ARBAC99 [18], ARBAC02 [19], and NIST RBAC [20]. Here, users operate the resources based on their assigned roles in the organization, and these roles can be varied accordingly [21]. RBAC administrator is engaged in keeping track and giving the roles to the users but cannot verify the user's role violations. is paper designs a novel approach to identifying users' actions by calculating their activities by incorporating trust and RBAC, namely, TRBAC. is access control mitigates the malicious actions caused by authenticated users. ...