PERMIS

Results: 1799



#Item
211Role-based access control / PERMIS / Mandatory access control / EXPRESS / Variable and attribute / Database management system / First-order logic / Security / Computer security / Access control

Paper Title (use style: paper title)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-07 14:08:57
212Identity management / Computing / Role-based access control / Middleware / PERMIS / Enterprise JavaBeans / Credential / Security / Access control / Systems engineering

Supporting Heterogeneous Middleware Security Policies in WebCom Simon N. Foley∗, Barry P. Mulcahy, Thomas B. Quillinan, Meabh O’Connor, and John P. Morrison Department of Computer Science, University College, Cork, I

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2006-08-23 05:01:03
213Role-based access control / Security-Enhanced Linux / PERMIS / Filesystem permissions / Multilevel security / Delegation in IT / AGDLP / Computer security / Security / Access control

Reconfiguring Role Based Access Control Policies Using Risk Semantics Benjamin Aziz? Simon N. Foley† Garret Swart‡

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2006-08-23 04:53:26
214Identity management / XACML / Role-based access control / OASIS / Authorization / PERMIS / Security / Computer security / Access control

XACML and Role-Based Access Control Jason Crampton Royal Holloway, University of London DIMACS Workshop on Secure Web Services and e-Commerce XACML and RBAC/Introduction

Add to Reading List

Source URL: www.cs.odu.edu

Language: English - Date: 2008-10-22 10:47:59
215Key management / Internet privacy / S/MIME / PERMIS / Public key certificate / X.509 / MIME / Certificate authority / Cryptography / Public-key cryptography / Email

ABUSE: PKI for Real-World Email Trust? Chris Masone, Sean Smith Dartmouth College, Hanover NHUSA Abstract. Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to det

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-09-03 12:10:34
216

Messages-clés ! Pourquoi devons-nous modifier le comportement des conducteurs adolescents ? Tout simplement parce que ces derniers qui représentent 13 % des conducteurs ayant leur permis, représentent aussi approxima

Add to Reading List

Source URL: projectgearshift.ca

Language: French - Date: 2014-10-02 10:19:04
    217Role-based access control / PERMIS / International Committee for Information Technology Standards / NIST RBAC model / Security / Access control / Computer security

    Chapter 1 EDAC and ANSI INCITSRBAC Conformance

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2007-09-19 01:00:00
    218Cryptographic protocols / Authentication protocol / PERMIS / Authentication / Communications protocol / Data / Information / Security

    Analysis and Synthesis of Authentication and Authorisation Mechanisms Against Subterfuge by Hongbin Zhou, B.E., M.E.

    Add to Reading List

    Source URL: www.cs.ucc.ie

    Language: English - Date: 2007-10-10 06:07:06
    219Computer security / Access control / Identity management / Authorization / Lightweight Directory Access Protocol / EXist / PERMIS / Security / XACML / Computing

    Advanced Access Authorization Technology White Paper: XACML Policy Enforcement System

    Add to Reading List

    Source URL: viewds.com

    Language: English
    220

    ´ Reponse Paris, le 27 novembre, 2000 On m’a permis d’exprimer en quelques mots ma reconnaissance. Je suis certainement tr`es fier de recevoir la

    Add to Reading List

    Source URL: www.sunsite.ubc.ca

    Language: French - Date: 2001-05-12 20:19:38
      UPDATE