Role-based access control

Results: 239



#Item
111Motoring taxation in the United Kingdom / Fee / Role-based access control / Pricing / Car safety / MOT test

Narromine Shire Council[removed]Fees & Charges (Amended[removed])

Add to Reading List

Source URL: www.narromine.nsw.gov.au

Language: English - Date: 2015-02-26 18:16:23
112Software bug / Computer architecture / Role-based access control / Snapshot / Security / Microsoft Windows / Computing / Windows XP

VMware Mirage Release Notes 3.7 Contents Release Content ........................................................................................................................................ 1 Fixed Issues ...........

Add to Reading List

Source URL: www.vmware.com

Language: English - Date: 2013-02-12 05:22:19
113Network management / Role-based access control / Distributed Management Task Force / Common Information Model / Identity management / Cloud computing / Virtual machine / Access control / Computing / Security

R&D supporting future cloud computing infrastructure technologies Authority Management Infrastructure for the Virtual Server Integrated Environment OGAWA Ryuichi, MAENO Yoshiharu, NAKAE Masayuki Abstract

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2012-09-11 09:44:21
114Accounting software / Oracle Applications / Project management software / Oracle Corporation / Oracle Identity Management / Oracle Database / Role-based access control / Enterprise resource planning / Guardium /  an IBM Company / Business / Software / Identity management

Oracle’s Application Access Control Governor

Add to Reading List

Source URL: www.oracle.com

Language: English
115Access control / Identity management / Authorization / Database / Role-based access control / ISO 10303 / Data model / Information security / Internet privacy / Security / Computing / Computer security

Microsoft Word - v4-1-7.doc

Add to Reading List

Source URL: eprints.usq.edu.au

Language: English - Date: 2013-07-02 20:28:16
116Key management / Role-based access control / Key / Database / Security / Access control / Cryptography

APPLYING ROLE HIERARCHY AND KEYS FOR ENCRYPTED DATABASE THANAROM NIMITKLAITIKAI A THESIS SUBMITTED IN PARTIAL FULFILLMENT

Add to Reading List

Source URL: www.li.mahidol.ac.th

Language: English - Date: 2010-12-23 21:58:18
117

FEDERATED ROLE-BASED ACCESS CONTROL MODELS (FRBAC) ANAN SHOTIPRAWIT A THESIS SUBMITTED IN PARTIAL FULFILLMENT

Add to Reading List

Source URL: www.li.mahidol.ac.th

Language: Thai - Date: 2004-02-27 01:34:06
    118Access control / Computer network security / Data security / Computer security / Wireless security / Role-based access control / Mobile / Wireless intrusion prevention system / Framework Programmes for Research and Technological Development / Wireless networking / Security / Technology

    WIPS 구성도 같은 그림 추가

    Add to Reading List

    Source URL: downloads.hindawi.com

    Language: English - Date: 2014-08-28 09:04:16
    119Role-based access control / Data security / Role hierarchy / PERMIS / Discretionary access control / Filesystem permissions / Mandatory access control / Information security / QE1 / Security / Computer security / Access control

    An Effective Role Administration Model Using Organization Structure SEJONG OH Dankook University and RAVI SANDHU and XINWEN ZHANG

    Add to Reading List

    Source URL: profsandhu.com

    Language: English - Date: 2008-02-07 14:26:30
    120Searching / WebML / Role-based access control / Database management systems / PERMIS / Search engine indexing / Enterprise search / Index / Web modeling / Information science / Information retrieval / Access control

    Proceedings of the 1st International Workshop on Collaborative Open Environments for Project-Centered Learning Role Based Access Control for the interaction with Search Engines ??

    Add to Reading List

    Source URL: ceur-ws.org

    Language: English - Date: 2008-01-07 04:16:30
    UPDATE