Capability-based security

Results: 256



#Item
161Military acquisition / United States Department of Homeland Security / Weapons of mass destruction / Under Secretary of Defense for Acquisition /  Technology and Logistics / Nuclear program of Iran / Access control / Capability-based security / Security

· r----------------\ l[removed]

Add to Reading List

Source URL: www.dnfsb.gov

Language: English - Date: 2014-11-20 05:01:18
162Information technology management / Standards / Technology / Access control / Capability-based security / Risk management information systems

Attachment W Service Desk SaaS Minimum System Requirements The System provides required functionality described below   Answer Yes or no in Vendor Response Column  

Add to Reading List

Source URL: doit.maryland.gov

Language: English - Date: 2014-09-12 13:15:19
163Humanitarian aid / Occupational safety and health / National security / Public safety / Capability-based security / Management / Critical infrastructure protection / Capability management / Security / Disaster preparedness / Emergency management

Crosswalk of Target Capabilities to Core Capabilities The following table maps the target capabilities outlined in the former Target Capabilities List (TCL) version 2.0, released in September 2007, to the new core capabi

Add to Reading List

Source URL: www.fema.gov

Language: English - Date: 2012-07-19 08:45:45
164Humanitarian aid / Occupational safety and health / National security / Public safety / Capability-based security / Management / Critical infrastructure protection / Capability management / Security / Disaster preparedness / Emergency management

Crosswalk of Target Capabilities to Core Capabilities The following table maps the target capabilities outlined in the former Target Capabilities List (TCL) version 2.0, released in September 2007, to the new core capabi

Add to Reading List

Source URL: www.azed.gov

Language: English - Date: 2013-02-27 11:46:13
165Identity management / Security Assertion Markup Language / Voms / PERMIS / Grid computing / Capability-based security / Authorization / Privilege Management Infrastructure / Authentication / Security / Computer security / Access control

Microsoft Word - pola021405.doc

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-02-23 09:14:33
166Capability-based security / Development economics / Capability / Sociocultural evolution / Modernization / Sociology

State Capability for Policy Implementation: Backgrouind to a Research Agenda

Add to Reading List

Source URL: www.hks.harvard.edu

Language: English - Date: 2012-09-25 11:26:29
167Access control / Capability-based security / Internet search engines

National Archives and Records Administration 860] Adelphi Road College Park, Maryland[removed]Date

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2011-01-10 14:04:54
168Dell / Pacific Northwest National Laboratory / EROS / Capability-based security / Computing / Technology / Electronics

1. CONTRACT ID CODE AMENDMENT OF SOLICITATION/MODIFICATION OF CONTRACT 2. AMENDMENT/MODIFICATION NO. 3. EFFECTIVE DATE

Add to Reading List

Source URL: doeprimecontract.pnnl.gov

Language: English - Date: 2013-05-03 17:29:45
169Humanitarian aid / Occupational safety and health / National security / Public safety / Capability-based security / Management / Critical infrastructure protection / Capability management / Security / Disaster preparedness / Emergency management

Crosswalk of Target Capabilities to Core Capabilities The following table maps the target capabilities outlined in the former Target Capabilities List (TCL) version 2.0, released in September 2007, to the new core capabi

Add to Reading List

Source URL: www.dmaps.wv.gov

Language: English - Date: 2012-12-19 10:53:32
170Information technology management / Software / Security / Software Engineering Institute / Capability Maturity Model / Risk management / Carnegie Mellon Silicon Valley / Evolutionary Process for Integrating COTS-Based Systems / Software development / Software development process / Carnegie Mellon University

Technical Report CMU/SEI-96-TR-012 ESC-TR[removed]Software Risk Management

Add to Reading List

Source URL: www.sei.cmu.edu

Language: English - Date: 2004-05-17 10:22:06
UPDATE