Filesystem permissions

Results: 508



#Item
471Identity management / Role-based access control / Unix / Role hierarchy / PERMIS / Theta role / Group / Function / Filesystem permissions / Security / Access control / Computer security

INHERITANCE PROPERTIES OF ROLE HIERARCHIES W.A. Jansen National Institute of Standards and Technology Gaithersburg, MD 20899, USA [removed] Abstract: Role Based Access Control (RBAC) refers to a class of security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
472Computer file formats / Names / Archive formats / Microsoft Windows / ASP.NET / Microsoft Visual Studio / Filename / Filesystem permissions / Windows Explorer / Software / Computing / System software

Website: www.chestysoft.com Email: [removed] csFileDownload[removed]ASP File Download Component This component allows file downloads to be controlled from within an ASP script. This is useful for

Add to Reading List

Source URL: www.chestysoft.com

Language: English - Date: 2013-10-25 11:32:17
473Perl / Regular expressions / Cross-platform software / Find / Filesystem permissions / CPAN / Open / Taint checking / Form / Computing / Software engineering / Computer programming

Perl for System Administration Jacinta Richardson Paul Fenwick Perl for System Administration

Add to Reading List

Source URL: perltraining.com.au

Language: English - Date: 2008-12-10 03:42:41
474Identity management / Role-based access control / Role hierarchy / Theta role / PERMIS / Filesystem permissions / Solid-state drive / Group / Delegation in IT / Security / Access control / Computer security

NISTIR[removed]A REVISED MODEL FOR ROLE-BASED ACCESS CONTROL W. A. Jansen July 9, 1998

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
475Role-based access control / PERMIS / XACML / Filesystem permissions / Modes / AGDLP / Delegation in IT / Security / Computer security / Access control

Insecure IT ABAC and RBAC: © Route66 | Dreamstime.com Scalable, Flexible,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-10 10:45:29
476Access control list / Filesystem permissions / Operating system / Capability-based security / File system / Unix / Kernel / Group identifier / Role-based access control / Security / Computer security / Access control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
477Access control / System administration / Access control list / Filesystem permissions / Mandatory access control / Operating system / File system / Role-based access control / Computer file / System software / Computing / Computer security

CHAPTER 4 Access Control Going all the way back to early time-sharing systems we systems

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:17
478Software / User identifier / Password / Filesystem permissions / File system / Rm / Computer file / Group identifier / Privilege / Unix / Computing / System software

system and offers a number of hints on how to improve security. The first fact to face is that UNIX was not developed with security, in any realistic sense, in mind; this fact alone guarantees a vast number of holes. (Ac

Add to Reading List

Source URL: wolfram.schneider.org

Language: English - Date: 2012-01-08 15:19:27
479System administration / Umask / Ubuntu / Lubuntu / Sudo / Xubuntu / Chmod / Filesystem permissions / SYS / Software / Computing / System software

Installing the GPL Version of OpenQM on Ubuntu Version: 2.00 Updated: 9 January, 2013 General This is a guide for installing the GPL version of OpenQM onto the Ubuntu distribution of Linux. It

Add to Reading List

Source URL: www.rushflat.co.nz

Language: English - Date: 2013-01-08 17:00:13
480Access control / Computer security / Filesystem permissions / Group / Usability / Photo sharing / Recall / Ls / Identity management / Computing / Security

Out of sight, out of mind: Effects of displaying access-control information near the item it controls Kami Vaniea∗ , Lujo Bauer∗ , Lorrie Faith Cranor∗ , and Michael K. Reiter† ∗ Carnegie Mellon University, Pit

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 09:01:57
UPDATE