Role-based access control

Results: 239



#Item
151Identity management / Role-based access control / PERMIS / Filesystem permissions / Role hierarchy / Resource Access Control Facility / Information security / Group / User identifier / Security / Computer security / Access control

Advanced Features for Enterprise-Wide Role-Based Access Control Axel Kern Systor Security Solutions GmbH Hermann-Heinrich-Gossen-Str[removed]K¨oln, Germany [removed]

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2002-12-09 11:36:37
152Role-based access control / Role hierarchy / PERMIS / NIST RBAC model / Delegation in IT / AGDLP / Computer security / Security / Access control

DRAFT[removed]BSR INCITS 359 American National Standard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2003-04-08 01:00:00
153Role-based access control / XACML / PERMIS / Authorization / Workflow / Security / Access control / Computer security

This paper describes the implementation of a Role Based Access

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-05-16 01:00:00
154Role-based access control / National Security Agency / Data security / Discretionary access control / Mandatory access control / Trusted Computer System Evaluation Criteria / Multilevel security / PERMIS / Separation of duties / Computer security / Security / Access control

Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992), Baltimore MD pp[removed]David F. Ferraiolo and D. Richard Kuhn National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-04-28 01:00:00
155Role-based access control / PERMIS / Mandatory access control / Discretionary access control / XACML / Role hierarchy / Database management system / Multilevel security / Computer security / Security / Access control

The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:29:04
156Data security / Role-based access control / PERMIS / Role hierarchy / Separation of duties / Information security / Principle of least privilege / Authorization / Operating system / Security / Computer security / Access control

SACMAT 2001: 6th ACM Symposium on Access Control Models and Technologies, Chantilly, VA, USA, ACM. The Role-Based Access Control System of a European Bank: A Case Study and Discussion Andreas Schaad

Add to Reading List

Source URL: moffett.me.uk

Language: English - Date: 2006-04-24 07:57:07
157XACML / Role-based access control / PERMIS / Role hierarchy / OASIS / Security / Computer security / Access control

3 XACML Profile for Role Based Access Control (RBAC) 4

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-04-05 16:10:01
158System software / Content management systems / Microsoft SharePoint / Portal software / NTBackup / Backup / Windows Registry / Role-based access control / HP Data Protector / Backup software / Software / Information technology management

DocAve® 6 Granular Backup and Restore User Guide Service Pack 4, Cumulative Update 3 Revision P

Add to Reading List

Source URL: www.avepoint.com

Language: English - Date: 2014-09-15 23:37:15
159Role-based access control / Role hierarchy / Organisation-based access control / PERMIS / Discretionary access control / Filesystem permissions / Mandatory access control / Computer security / Security / Access control

Conflict Checking of Separation of Duty Constraints in RBAC Implementation Experiences Mark Strembeck Department of Information Systems, New Media Lab Vienna University of Economics and BA, Austria mark.strembeck@wu-wien

Add to Reading List

Source URL: wi.wu-wien.ac.at

Language: English - Date: 2003-12-12 09:40:31
160Access control / Computer security / Identity management / Enterprise modelling / Role-based access control / FTC Fair Information Practice / Internet privacy / Role hierarchy / Health Insurance Portability and Accountability Act / Privacy / Security / Ethics

A Framework for Modeling Privacy Requirements in Role Engineering Qingfeng He and Annie I. Antόn Department of Computer Science North Carolina State University Raleigh, NC[removed], USA {qhe2, aianton}@eos.ncsu.edu

Add to Reading List

Source URL: crinfo.univ-paris1.fr

Language: English - Date: 2003-05-15 04:24:41
UPDATE