Back to Results
First PageMeta Content
Role-based access control / Role hierarchy / PERMIS / Filesystem permissions / Mandatory access control / Delegation in IT / AGDLP / Computer security / Security / Access control


IEEE Computer, Volume 29, Number 2, February 1996, pages[removed]Role-Based Access Control Modelsyz Ravi S. Sandhu , Edward J. Coyne , Hal L. Feinstein and Charles E. Youman {
Add to Reading List

Document Date: 2007-10-10 01:00:00


Open Document

File Size: 232,64 KB

Share Result on Facebook

Company

SETA Corporation / RBAC / Novell / Microsoft / /

/

Facility

National Institute of Standards and Technology / George Mason University / /

/

IndustryTerm

large systems / computer systems / network operating systems / multiapplication on-line systems / database management systems / erent systems / application software / access control systems / longdistance telephone circuits / /

OperatingSystem

Unix / NetWare / Microsoft Windows / /

Organization

National Institute of Standards and Technology / National Science Foundation / ISSE Department / George Mason University / /

Person

Ravi S. Sandhu / Charles E. Youman / Thomas / Hal L. Feinstein / Edward J. Coyne / /

/

Position

supervisor / shift manager / project supervisor / role test engineer / system administrator / test engineer / physician and specialist physician / pharmacist / general support / physician / duty physician / accounting clerk and account manager / test engineer and programmer / auditor / private role programmer / /

ProvinceOrState

Pennsylvania / /

Technology

relational database / Unix / Unix operating system / operating system / operating systems / /

SocialTag