2022
DOI: 10.1111/coin.12523
|View full text |Cite
|
Sign up to set email alerts
|

Real geo‐time‐based secured access computation model for e‐Health systems

Abstract: Role Back Access Control model (RBAC) allows devices to access cloud services after authentication of requests. However, it does not give priority in Big Data to devices located in certain geolocations. Regarding the 18

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 67 publications
0
1
0
Order By: Relevance
“…The conventional RBAC model can reflect the structure of personnel organization, but it uses static permission which is difficult to satisfy the situation with frequently changed permission. Because of that, some studies introduced time 6 , location 7 and priority 8 to RBAC model, expanding its applicable scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…The conventional RBAC model can reflect the structure of personnel organization, but it uses static permission which is difficult to satisfy the situation with frequently changed permission. Because of that, some studies introduced time 6 , location 7 and priority 8 to RBAC model, expanding its applicable scenarios.…”
Section: Introductionmentioning
confidence: 99%