Role-based access control

Results: 239



#Item
91XACML / Matrix / Role-based access control / PERMIS / Security / Computer security / Access control

Towards Policy Engineering for Attribute-based Access Control⋆ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2014-09-19 11:36:58
92Standards organizations / Access control / XACML / Identity management / Authorization / PERMIS / Traceability / Radio-frequency identification / Role-based access control / Security / Computer security / Technology

Enforcing RFID Data Visibility Restrictions Using XACML Security Policies Miguel L. Pardal† , Mark Harrison‡ , Sanjay Sarma§ , Jos´e Alves Marques† † Department of Computer Science and Engineering

Add to Reading List

Source URL: web.ist.utl.pt

Language: English - Date: 2014-07-09 11:23:58
93Identity management / Role-based access control / Access / Access control / Security / Computer security

Author manuscript, published in "4th International Workshop on Autonomous and Spontateous Security (SETOP[removed])" Risk-based Auto-Delegation for Probabilistic Availability ? Leanid Krautsevich1 , Fabio Martinelli2 , Ch

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2012-03-30 08:11:45
94Software engineering / Globus Toolkit / Grid Security Infrastructure / Passport / Role-based access control / Delegation / XTR / Computing / Grid computing / Security

G-PASS-camera-ready-final.dvi

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2004-07-09 03:47:01
95Lattice theory / Lattice-based access control / Role-based access control / Mihir Bellare / National Security Agency / Principal investigator / Public-key cryptography / PERMIS / Cryptography / Computer security / Security

Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security Professor of Computer Science, College of Sciences www.p

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2013-10-09 14:40:49
96Security / PERMIS / XACML / Security policy / Politics / Policy / Access control / Role-based access control

Policy 2001 Workshop on Policies for Distributed Systems and Networks[removed]January 2001 Hosted by HP Laboratories, Bristol, UK Technical Co-sponsored by IEEE ComSoc

Add to Reading List

Source URL: www.policy-workshop.org

Language: English - Date: 2001-01-24 06:13:18
97Role-based access control / Computer security conference / NIST RBAC model / Association for Computing Machinery / Access control / Security / Computer security

Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2013-10-09 14:42:19
98International nongovernmental organizations / Lattice theory / Lattice-based access control / International Conference on Availability /  Reliability and Security / Multilevel security / Secure communication / Capability-based security / Role-based access control / Mandatory access control / Computer security / Security / Access control

Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2013-10-09 14:35:16
99Role-based access control / Graph theory / Graph / Role hierarchy / PERMIS / Filesystem permissions / Discretionary access control / Clique / Tree / Security / Computer security / Access control

T RANSACTIONS ON D ATA P RIVACY () –26 Efficient Graph Based Approach to Large Scale Role Engineering Dana Zhang∗ , Kotagiri Ramamohanarao∗ , Rui Zhang∗ , Steven Versteeg∗∗ ∗ The

Add to Reading List

Source URL: www.ruizhang.info

Language: English - Date: 2014-02-27 08:22:04
100Role-based access control / PERMIS / Filesystem permissions / Data mining / AGDLP / Delegation in IT / Security / Access control / Computer security

RoleVAT: Visual Assessment of Practical Need for Role Based Access Control Rui Zhang Steven Versteeg Kotagiri Ramamohanarao Dana Zhang The University of Melbourne

Add to Reading List

Source URL: www.ruizhang.info

Language: English - Date: 2009-09-23 23:57:52
UPDATE