Role hierarchy

Results: 59



#Item
31Role-based access control / PERMIS / Mandatory access control / Discretionary access control / XACML / Role hierarchy / Database management system / Multilevel security / Computer security / Security / Access control

The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:29:04
32Data security / Role-based access control / PERMIS / Role hierarchy / Separation of duties / Information security / Principle of least privilege / Authorization / Operating system / Security / Computer security / Access control

SACMAT 2001: 6th ACM Symposium on Access Control Models and Technologies, Chantilly, VA, USA, ACM. The Role-Based Access Control System of a European Bank: A Case Study and Discussion Andreas Schaad

Add to Reading List

Source URL: moffett.me.uk

Language: English - Date: 2006-04-24 07:57:07
33XACML / Role-based access control / PERMIS / Role hierarchy / OASIS / Security / Computer security / Access control

3 XACML Profile for Role Based Access Control (RBAC) 4

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-04-05 16:10:01
34Knowledge representation / Data modeling / Object-oriented programming / Hierarchy / Patterns / Political culture / Knowledge representation and reasoning / Frame language / EXPRESS / Information / Data / Software engineering

Library Trends: The Role of Classification in Knowledge Repre... http://findarticles.com/p/articles/mi_m1387/is_1_48/ai_570465... FindArticles > Library Trends > Summer, 1999 > Article > Print friendly

Add to Reading List

Source URL: polaris.gseis.ucla.edu

Language: English - Date: 2008-09-30 02:53:09
35Role-based access control / Role hierarchy / Organisation-based access control / PERMIS / Discretionary access control / Filesystem permissions / Mandatory access control / Computer security / Security / Access control

Conflict Checking of Separation of Duty Constraints in RBAC Implementation Experiences Mark Strembeck Department of Information Systems, New Media Lab Vienna University of Economics and BA, Austria mark.strembeck@wu-wien

Add to Reading List

Source URL: wi.wu-wien.ac.at

Language: English - Date: 2003-12-12 09:40:31
36Access control / Computer security / Identity management / Enterprise modelling / Role-based access control / FTC Fair Information Practice / Internet privacy / Role hierarchy / Health Insurance Portability and Accountability Act / Privacy / Security / Ethics

A Framework for Modeling Privacy Requirements in Role Engineering Qingfeng He and Annie I. Antόn Department of Computer Science North Carolina State University Raleigh, NC[removed], USA {qhe2, aianton}@eos.ncsu.edu

Add to Reading List

Source URL: crinfo.univ-paris1.fr

Language: English - Date: 2003-05-15 04:24:41
37XACML / Role-based access control / PERMIS / Role hierarchy / OASIS / Security / Computer security / Access control

3 XACML Profile for Role Based Access Control (RBAC) 4

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2004-07-19 15:32:40
38Role-based access control / Identity management / Role hierarchy / Discretionary access control / Mandatory access control / Lattice-based access control / AGDLP / Delegation in IT / Computer security / Security / Access control

OBSERVATIONS ON THE REAL-WORLD IMPLEMENTATION OF ROLE-BASED ACCESS CONTROL Burkhard Hilchenbach Schumann Security Software, Inc. 314 Marshall Road

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
39Role-based access control / Role hierarchy / PERMIS / XACML / Delegation in IT / AGDLP / Security / Access control / Computer security

Microsoft Word - Healthcare RBAC TF Role Engineering Process v3.0.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-31 15:50:04
40Computer data / Statistic / Relation / Software engineering / Data / OMTROLL / Attribute Hierarchy Method / Role-playing game terminology / Computing / Attribute

S-57 Appendix A Chapter 2 - Attributes Edition 3.1 Attributes

Add to Reading List

Source URL: www.iho-ohi.net

Language: English - Date: 2009-09-05 05:01:36
UPDATE