Discretionary access control

Results: 58



#Item
31Role-based access control / National Security Agency / Data security / Discretionary access control / Mandatory access control / Trusted Computer System Evaluation Criteria / Multilevel security / PERMIS / Separation of duties / Computer security / Security / Access control

Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992), Baltimore MD pp[removed]David F. Ferraiolo and D. Richard Kuhn National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-04-28 01:00:00
32Role-based access control / PERMIS / Mandatory access control / Discretionary access control / XACML / Role hierarchy / Database management system / Multilevel security / Computer security / Security / Access control

The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:29:04
33Role-based access control / Role hierarchy / Organisation-based access control / PERMIS / Discretionary access control / Filesystem permissions / Mandatory access control / Computer security / Security / Access control

Conflict Checking of Separation of Duty Constraints in RBAC Implementation Experiences Mark Strembeck Department of Information Systems, New Media Lab Vienna University of Economics and BA, Austria mark.strembeck@wu-wien

Add to Reading List

Source URL: wi.wu-wien.ac.at

Language: English - Date: 2003-12-12 09:40:31
34Role-based access control / XACML / Mandatory access control / Discretionary access control / Authorization / PERMIS / Computer security / Security / Access control

A Meta Model for Access Control: Why is it needed and is it even possible to achieve?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:58:32
35Role-based access control / Identity management / Role hierarchy / Discretionary access control / Mandatory access control / Lattice-based access control / AGDLP / Delegation in IT / Computer security / Security / Access control

OBSERVATIONS ON THE REAL-WORLD IMPLEMENTATION OF ROLE-BASED ACCESS CONTROL Burkhard Hilchenbach Schumann Security Software, Inc. 314 Marshall Road

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
36Discretionary access control / Mandatory access control / Access Control Matrix / Role-based access control / Capability-based security / Authorization / Type enforcement / Bell–LaPadula model / Computer security / Security / Access control

NISTIR xxxx, Policy Machine: Features, Architecture, and Specification

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:38:25
37Access control / PERMIS / Role-based access control / Type enforcement / Discretionary access control / Attrib / Security-Enhanced Linux / Multilevel security / Database management system / Computer security / Security / Computing

Proceedings Template - WORD

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:22:00
38Role-based access control / NIST RBAC model / Role hierarchy / PERMIS / Discretionary access control / Mandatory access control / Delegation in IT / AGDLP / Computer security / Security / Access control

Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, [removed]

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-04-05 18:45:38
39Computer security / Crime prevention / Access control / Identity management / Authorization / Password / Information security / Internet privacy / Discretionary access control / Security / Public safety / National security

CHI 2008 Proceedings · Policy, Telemedicine, and Enterprise April 5-10, 2008 · Florence, Italy A User Study of Policy Creation in a Flexible Access-Control System

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 08:58:11
40Access control / PERMIS / Role-based access control / Type enforcement / Discretionary access control / Attrib / Security-Enhanced Linux / Multilevel security / Database management system / Computer security / Security / Computing

Composing and Combining Policies under the Policy Machine David F. Ferraiolo, Serban Gavrila*, Vincent Hu, D. Richard Kuhn National Institute of Standards and Technology Gaithersburg, MD 20899 +[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-26 01:00:00
UPDATE