<--- Back to Details
First PageDocument Content
Role-based access control / PERMIS / Role hierarchy / Mandatory access control / Mutator method / Discretionary access control / AGDLP / Computer security / Security / Access control
Date: 2008-10-16 13:26:08
Role-based access control
PERMIS
Role hierarchy
Mandatory access control
Mutator method
Discretionary access control
AGDLP
Computer security
Security
Access control

Microsoft Word - SampleChapter.doc

Add to Reading List

Source URL: www.killerphp.com

Download Document from Source Website

File Size: 934,99 KB

Share Document on Facebook

Similar Documents

Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems Kazuhiro Minami, Nikita Borisov, and Carl A. Gunter University of Illinois at Urbana-Champaign {minami,

DocID: 1o7ui - View Document

Computing / Software / Computer architecture / Smartphones / Wireless / Android / Mobile operating systems / Near field communication / Google Play / Mobile app / IOS / Mandatory access control

What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources Soteris Demetriou†* , Xiaoyong Zhou‡* , Muhammad Naveed† , Yeonjoon Lee‡ , Kan Yuan‡ , XiaoFeng Wan

DocID: 1mMDu - View Document

Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

DocID: 1mquH - View Document

Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

DocID: 1mkXj - View Document

Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access (Short Paper) Daniel Slamanig Carinthia University of Applied Sciences, Primoschgasse 10, 9020 Klagenfurt, Austria. d.s

DocID: 1l7f0 - View Document