Capability-based security

Results: 256



#Item
41Concurrent computing / Scripting languages / Tcl / Coroutine / EROS / Shell / Capability-based security / Tk / Unix / Computing / Computer programming / Software engineering

PDF Document

Add to Reading List

Source URL: www.sgo.fi

Language: English - Date: 2014-02-28 11:50:26
42Medical informatics / Access control / OpenEMR / Medical terms / United States Department of Veterans Affairs / Capability-based security / Belaying / Patient safety / VistA / Health / Medicine / Health informatics

Capability Exchange: Improving Access Control Usability in Health IT Chen Qin, Emily Freebairn, Sean Smith Department of Computer Science Dartmouth College July 18, 2013

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2013-09-11 09:13:33
43Computer security / Identity management / Mandatory access control / Database / Capability-based security / Security / Database management systems / Access control

On the Unification of Access Control and Data Services David Ferraiolo1, Serban Gavrila1, Wayne Jansen2 1 National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-28 16:26:44
44Management / Process management / Quality control / ESCM-SP / Access control / Capability-based security / Information technology management

CAPABILITY EXPENDITURE B.29[99c] SIXThe term “capability” can be used to embrace a number

Add to Reading List

Source URL: oag.govt.nz

Language: English - Date: 2014-04-29 00:45:24
45Johns Hopkins University / Capability-based security / International Space Station / EROS / Spaceflight / Large Synoptic Survey Telescope / Telescopes

Session 6: Affordable Options for Increasing the Accessible NEO Catalog Chaired by: Rich Dissly Dissly,, Ball Aerospace

Add to Reading List

Source URL: targetneo.jhuapl.edu

Language: English - Date: 2014-07-30 15:45:59
46Economics / Norman Daniels / Capability approach / Harry Brighouse / Deontological ethics / Capability-based security / Justice / Thomas Pogge / Cambridge University Press / Development / Welfare economics / Academia

Cambridge University Press8 - Measuring Justice: Primary Goods and Capabilities Edited by Harry Brighouse and Ingrid Robeyns Table of Contents More information

Add to Reading List

Source URL: assets.cambridge.org

Language: English - Date: 2010-01-11 04:00:19
47Computer data storage / Computing / E-Science / Cyberinfrastructure / Capability-based security

Microsoft PowerPoint - York 2011 UTRC.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.aamc.org

Language: English - Date: 2012-09-18 12:02:29
48Server appliance / Software appliances / EMC Corporation / Data Access in Real Time / CLARiiON / Network-attached storage / Capability-based security / Computer security / Information Lifecycle Management / Computing / Security / Celerra

Celerra Evaluation.indd

Add to Reading List

Source URL: www.kahnconsultinginc.com

Language: English - Date: 2007-06-06 22:34:00
49Prognostics / Failure / Systems engineering / Knowledge / Availability / Downtime / Capability-based security / Science / Maintenance / Survival analysis / Prediction

Prognostics and Health Management (PHM) Health management is the discipline of linking the monitoring of failure mechanisms and residual life estimation to the system’s lifecycle management in order to minimize system

Add to Reading List

Source URL: www.cadituk.com

Language: English - Date: 2014-10-10 15:47:54
50Electronic engineering / Linux-based devices / Wireless networking / Linksys / Videotelephony / Wi-Fi / Wireless security / Wireless access point / IEEE 802.11 / Technology / Computing / Computer network security

Linux Wireless The Linux-based Wireless-G Linux Broadband Router was created specially for hobbyists and wireless aficionados. Add wireless capability to your wired network and enjoy the convenience that comes when you e

Add to Reading List

Source URL: www.nerim.fr

Language: English - Date: 2014-03-25 06:30:44
UPDATE