First Page | Document Content | |
---|---|---|
![]() Date: 2005-04-29 09:42:28Computer security Security Access control Computer access control XACML Binary decision diagram PERMIS Information flow Role-based access control Policy analysis Security-Enhanced Linux Model checking | Add to Reading List |
![]() | Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TTDocID: 1voGj - View Document |
![]() | Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TTDocID: 1tYAK - View Document |
![]() | 2 SAML 2.0 profile of XACML v2.0 3DocID: 1sUul - View Document |
![]() | Draft NISTIR 8112, Attribute MetadataDocID: 1rtQZ - View Document |
![]() | Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins RoaDocID: 1rtqe - View Document |