Capability-based security

Results: 256



#Item
171Humanitarian aid / Occupational safety and health / National security / Public safety / Capability-based security / Management / Critical infrastructure protection / Capability management / Security / Disaster preparedness / Emergency management

Crosswalk of Target Capabilities to Core Capabilities The following table maps the target capabilities outlined in the former Target Capabilities List (TCL) version 2.0, released in September 2007, to the new core capabi

Add to Reading List

Source URL: www.cdham.org

Language: English - Date: 2013-05-14 10:23:48
172Program management / Security / Management / Business / Statutory boards of the Singapore Government / Capability management / Development / Capacity development / Capability-based security

The 5 Capabilities approach in capacity development of organisations This flyer can be used as a reference on how the 5C approach can be integrated in NICHE projects. 1 The NICHE programme contributes to sustainable stre

Add to Reading List

Source URL: www.nuffic.nl

Language: English - Date: 2014-03-17 07:01:04
173Online shopping / Internet / Computing / Technology / Email / Access control / Capability-based security

Company Name Here: CAGE: POC Email: Information Technology Product/Service(S) Key Commercial/Government Customers

Add to Reading List

Source URL: www.gunter.af.mil

Language: English - Date: 2014-08-01 09:36:27
174Access control / Capability-based security / Data center / United States Environmental Protection Agency / Statement of work / Concurrent computing / Distributed computing / Computing

Capability Statement Interested sources should respond to this RFI by completing the Capability Statement below. For items II-IV, the responder may provide a simple yes or no response. The responder may also elaborate on

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2013-10-01 09:09:11
175Discretionary access control / Mandatory access control / Access Control Matrix / Role-based access control / Capability-based security / Authorization / Type enforcement / Bell–LaPadula model / Computer security / Security / Access control

NISTIR xxxx, Policy Machine: Features, Architecture, and Specification

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:38:25
176Object-oriented programming / Access control / Database management systems / Component-based software engineering / Inter-process communication / Capability-based security / Object database / Class / Java / Software engineering / Computing / Computer programming

A Case Study in Access Control Requirements for a Health Information System Mark Evered Serge Bögeholz School of Mathematics, Statistics and Computer Science University of New England

Add to Reading List

Source URL: crpit.com

Language: English - Date: 2012-01-19 01:27:31
177Government procurement in the United States / United States administrative law / Core competency / Request for proposal / Email / Capability-based security / Capability management in business / Business / Management / Strategic management

Building a Capabilities Statement Stand out in a competitive marketplace with a capabilities statement Leslie Miller Manager, Eastern Washington

Add to Reading List

Source URL: www.greaterspokane.org

Language: English - Date: 2012-03-28 16:22:11
178Humanitarian aid / Occupational safety and health / National security / Public safety / Capability-based security / Management / Critical infrastructure protection / Capability management / Security / Disaster preparedness / Emergency management

Crosswalk of Target Capabilities to Core Capabilities The following table maps the target capabilities outlined in the former Target Capabilities List (TCL) version 2.0, released in September 2007, to the new core capabi

Add to Reading List

Source URL: www.caloes.ca.gov

Language: English - Date: 2014-07-31 18:02:20
179Fee / Security / Access control / Capability-based security / Ignition interlock device

APPLICATION ATTACHMENT A – Device 1 IGNITION INTERLOCK DEVICE INFORMATION Applicant Organization Name: Device Make:

Add to Reading List

Source URL: dpca.state.ny.us

Language: English - Date: 2010-04-23 15:55:54
180Data management / Cloud storage / Data center / Distributed data storage / Networks / Identity management / Capability-based security / Computer security / Nys / Security / Concurrent computing / Computing

Microsoft PowerPoint - Chan presentation_Final.pptx

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2013-05-23 20:44:41
UPDATE