Role-based access control

Results: 239



#Item
121Role-based access control / PERMIS / Role hierarchy / Mandatory access control / Mutator method / Discretionary access control / AGDLP / Computer security / Security / Access control

Microsoft Word - SampleChapter.doc

Add to Reading List

Source URL: www.killerphp.com

Language: English - Date: 2008-10-16 13:26:08
122Identity management / Authorization / Role-based access control / PERMIS / Group / Mandatory access control / Security / Access control / Computer security

Web App Access Control Design Access Control Best Practices • • •

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:41:45
123Role-based access control / Role hierarchy / PERMIS / NIST RBAC model / Delegation in IT / AGDLP / Computer security / Security / Access control

DRAFT[removed]BSR INCITS 359 American National Standard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-05-05 01:00:00
124Role-based access control / Role hierarchy / PERMIS / NIST RBAC model / Mandatory access control / Filesystem permissions / Modal logic / Datalog / Computer security / Security / Access control

Expressing User Access Authorization Exceptions in Conventional Role-based Access Control Xiaofan Liu1,2 , Natasha Alechina1 , and Brian Logan1 1 2

Add to Reading List

Source URL: www.cs.nott.ac.uk

Language: English - Date: 2014-09-26 16:58:51
125Role-based access control / XACML / Discretionary access control / PERMIS / Information security / Authorization / Security management / Capability-based security / Federal Information Security Management Act / Security / Computer security / Access control

NIST 7316, Assessment of Access Control Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-15 09:51:53
126Model checkers / Applied mathematics / Model checking / NuSMV / Software testing / Formal verification / Role-based access control / Software development process / Formal methods / Access control / Security

Property Verification for Generic Access Control Models

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-01 10:19:28
127Computer security / XACML / Identity management / PERMIS / Obligation / Representational state transfer / Role-based access control / Spring Framework / Authorization / Computing / Security / Access control

A Framework for Obligation Fulfillment in REST Services John P. Field EMC Corporation 1133 Westchester Avenue White Plains, NY, [removed]-3522

Add to Reading List

Source URL: ws-rest.org

Language: English - Date: 2011-03-22 12:15:31
128Computer security / Provisioning / Telecommunications / Role-based access control / User provisioning software / Identity correlation / Identity management / Security / Access control

Clinical Access Governance The access of information assets within the organization is a critical theme for security and compliance managers. Enterprise healthcare organizations face a myriad of compliance requests that

Add to Reading List

Source URL: www.caradigm.com

Language: English - Date: 1979-12-31 19:00:00
129Computer security / OpenLDAP / Lightweight Directory Access Protocol / Role-based access control / Apache Directory / Delegated administration / Kerberos / Access control / NIST RBAC model / Directory services / Security / Computing

RBAC Authorization With Apache Directory Server And Fortress Shawn McKinney Emmanuel Lécharny

Add to Reading List

Source URL: directory.apache.org

Language: English - Date: 2014-11-25 02:40:33
130Role-based access control / Role hierarchy / Mutual exclusion / Separation of duties / Mandatory access control / Security / Computer security / Access control

Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 12:37:28
UPDATE