<--- Back to Details
First PageDocument Content
Computer access control / Access control / Access control list / Mandatory access control / Role-based access control / Privilege / WebDAV / User / PERMIS / Capability-based security / Superuser / NTFS
Date: 2006-06-13 14:38:51
Computer access control
Access control
Access control list
Mandatory access control
Role-based access control
Privilege
WebDAV
User
PERMIS
Capability-based security
Superuser
NTFS

Intentional Access Management: Making Access Control Usable for End-Users

Add to Reading List

Source URL: cups.cs.cmu.edu

Download Document from Source Website

File Size: 996,43 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

DocID: 1xUQb - View Document

Cryptography / Public-key cryptography / Transport Layer Security / Key management / Public key infrastructure / Man-in-the-middle attack / Secure Shell / Forward secrecy / Elliptic-curve DiffieHellman / Replay attack / Cryptographic protocol / Handshaking

Designing a Secret Handshake: Authenticated Key Exchange as a Capability System Dominic Tarr July 10, 2015 Abstract Capability Based Security is a conceptual framework for designing

DocID: 1xT6c - View Document

Software / System software / Computer architecture / Disk file systems / Network file systems / File system / ZFS / Tar / XFS / Capability-based security / Filesystem in Userspace / Data

Hierarchical File Systems are Dead Margo Seltzer, Nicholas Murphy Harvard School of Engineering and Applied Sciences Abstract

DocID: 1rbB7 - View Document

Computer security / Computer access control / Software / Computing / Access control / Memory management / Memory protection / Kernel / Capability-based security / Operating system / Access Control Matrix / File system

Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract

DocID: 1r6Eg - View Document

Business / Professional studies / Economy / Groupware / Multimodal interaction / Information economics / Social information processing / Business software / Collaborative software / Knowledge worker / Capability-based security / Object Process Methodology

Toward HighPerformance Organizations Role For Groupware Strategic

DocID: 1qIIY - View Document