Role-based access control

Results: 239



#Item
141Role-based access control / PERMIS / Security / Access control / Computer security

Microsoft Word - FR[removed]Final Report.doc

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-03-03 15:13:09
142Access control / Information security / National security / Role-based access control / Security controls / Password / Database security / Trusted Computer System Evaluation Criteria / Security / Computer security / Data security

Control Family & Class

Add to Reading List

Source URL: cms.gov

Language: English - Date: 2013-11-20 12:11:50
143Access control / System administration / Filesystem permissions / Role-based access control / Usability / User interface design / Human–computer interaction / NTFS / User interface / System software / Computing / Software

User Interface Dependability through Goal-Error Prevention Robert W. Reeder and Roy A. Maxion [removed] and [removed] Dependable Systems Laboratory Computer Science Department

Add to Reading List

Source URL: www.robreeder.com

Language: English - Date: 2009-02-28 19:03:50
144Access control / Mandatory access control / Information security / Security controls / XACML / Role-based access control / Health Insurance Portability and Accountability Act / Security policy / Trusted Computer System Evaluation Criteria / Security / Computer security / Data security

Control Family & Class

Add to Reading List

Source URL: cms.gov

Language: English - Date: 2013-11-20 12:11:33
145Information technology audit / Payment systems / United States Department of Agriculture / Electronic Benefit Transfer / Cyberwarfare / National security / Supplemental Nutrition Assistance Program / Vulnerability / Role-based access control / Federal assistance in the United States / Security / Computer security

New Jersey State Legislature Office of Legislative Services Office of the State Auditor Department of Human Services Division of Family Development

Add to Reading List

Source URL: www.njleg.state.nj.us

Language: English - Date: 2000-06-13 09:22:20
146Copyright / Free software / Hardcover / Information / Paperback / Role-based access control

Text Permission Inventory for Quotations of Others’ Works AUTHOR _________________________________ BOOK TITLE ___________________________________________________________ Please consult the section on permissions i

Add to Reading List

Source URL: www.ugapress.org

Language: English - Date: 2009-03-05 14:15:28
147Obsessive–compulsive disorder / Ritual / Role-based access control / Email / Form / Computing / Access control / Internet

Instructions for OCD OCEAN Intake Forms Purpose The purpose of the OCD OCEAN Intake Form set is to collect information necessary for setting up your organization’s members as Contacts or Users in OCEAN, the system to b

Add to Reading List

Source URL: cohhio.org

Language: English - Date: 2014-04-01 19:11:46
148Computing / System call / Role-based access control / Kernel

Native Host Intrusion Protection with  RHEL5 and the Audit Subsystem Steve Grubb May 11, 2007 Introduction

Add to Reading List

Source URL: people.redhat.com

Language: English - Date: 2009-10-30 14:24:54
149Intellectual property law / Copyright / Data management / Monopoly / Filesystem permissions / B.C. / Internet privacy / Role-based access control / Secret Chiefs 3 / Data / Information / Library science

Microsoft Word - Permissions application and agreement.doc

Add to Reading List

Source URL: ubcic.bc.ca

Language: English - Date: 2012-03-29 22:05:34
150Identity management / Data security / Role-based access control / XACML / Computer network security / Department of Defense Architecture Framework / Security controls / Authentication / Cloud computing / Security / Computer security / Access control

Attribute Based Access Control (ABAC) Workshop Minutes from July 2013 Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-08-07 10:47:35
UPDATE