Role hierarchy

Results: 59



#Item
11Web 2.0 / Social information processing / Social media / Internet culture / Online chat / Yammer / Enterprise social software / Microblogging / Twitter / World Wide Web / Technology / Computing

HIERARCHY OR ACTIVITY? THE ROLE OF FORMAL AND INFORMAL INFLUENCE IN ELICITING RESPONSES FROM ENTERPRISE SOCIAL NETWORKS Complete Research Stieglitz, Stefan, University of Münster, Münster, Germany, stefan.stieglitz@uni

Add to Reading List

Source URL: ecis2014.eu

Language: English - Date: 2014-06-05 06:45:34
12Process management / Role-based access control / Organisation-based access control / Role hierarchy / PERMIS / Theory of constraints / Process / Security / Access control / Computer security

An Approach to Engineer and Enforce Context Constraints in an RBAC Environment Gustaf Neumann Mark Strembeck

Add to Reading List

Source URL: wi.wu-wien.ac.at

Language: English - Date: 2015-02-14 09:46:19
13Semantics / Knowledge representation / Parts of speech / WordNet / Noun / Word-sense disambiguation / Lexical item / Hyponymy / Theta role / Linguistics / Lexical semantics / Computational linguistics

The Descent of Hierarchy, and Selection in Relational Semantics Barbara Rosario SIMS UC Berkeley Berkeley, CA 94720

Add to Reading List

Source URL: bailando.sims.berkeley.edu

Language: English - Date: 2002-05-10 20:37:36
14Computing / EXPRESS / Subtype polymorphism / Object-Role Modeling / Hierarchy / Information model / Conceptual model / Object-oriented design / Class / Software engineering / Data modeling / Object-oriented programming

The MVZ Collections Information Model Introduction The collections information model represents the third element in the analysis and design phase of the MVZ’s Collections Information System Re-Engineering Project. It

Add to Reading List

Source URL: mvz.berkeley.edu

Language: English - Date: 2013-06-14 16:35:43
15Computer network security / Data security / NIST RBAC model / Role-based access control / PERMIS / Solid-state drive / International Committee for Information Technology Standards / Hierarchy / Computer security / Security / Access control

Microsoft Word - BSR+INCITS+359.doc

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2008-02-07 14:26:30
16Role-based access control / Graph theory / Graph / Role hierarchy / PERMIS / Filesystem permissions / Discretionary access control / Clique / Tree / Security / Computer security / Access control

T RANSACTIONS ON D ATA P RIVACY () –26 Efficient Graph Based Approach to Large Scale Role Engineering Dana Zhang∗ , Kotagiri Ramamohanarao∗ , Rui Zhang∗ , Steven Versteeg∗∗ ∗ The

Add to Reading List

Source URL: www.ruizhang.info

Language: English - Date: 2014-02-27 08:22:04
17Structure / Social philosophy / Gender studies / Socioeconomics / Hierarchy / Patterns / Glass ceiling / Gender role / Gender / Sociology / Social psychology / Behavior

Forum on Public Policy Who Does She Think She Is? A Group-Level Theoretical Consideration of Women and Authority in Organizations Karen L. Proudford, Associate Professor of Management, Morgan State University Abstract

Add to Reading List

Source URL: forumonpublicpolicy.com

Language: English - Date: 2013-02-27 14:22:54
18Australian court hierarchy / Rule of law / Judicial independence in Singapore / Judiciary of Germany / Law / Legal professions / Magistrate

Judgment based in legislation is fundamental to democracy • PHILIP MCMURDO • THE AUSTRALIAN • November 15, 2013 RECENT events in Queensland make it necessary for many to be reminded of the proper role of Australian

Add to Reading List

Source URL: www.jca.asn.au

Language: English - Date: 2013-11-27 05:47:07
19Key management / Role-based access control / Key / Database / Security / Access control / Cryptography

APPLYING ROLE HIERARCHY AND KEYS FOR ENCRYPTED DATABASE THANAROM NIMITKLAITIKAI A THESIS SUBMITTED IN PARTIAL FULFILLMENT

Add to Reading List

Source URL: www.li.mahidol.ac.th

Language: English - Date: 2010-12-23 21:58:18
20Role-based access control / Data security / Role hierarchy / PERMIS / Discretionary access control / Filesystem permissions / Mandatory access control / Information security / QE1 / Security / Computer security / Access control

An Effective Role Administration Model Using Organization Structure SEJONG OH Dankook University and RAVI SANDHU and XINWEN ZHANG

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2008-02-07 14:26:30
UPDATE