Role-based access control

Results: 239



#Item
161Role-based access control / XACML / Mandatory access control / Discretionary access control / Authorization / PERMIS / Computer security / Security / Access control

A Meta Model for Access Control: Why is it needed and is it even possible to achieve?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:58:32
162Science / Information / Invenio / Open Archives Initiative Protocol for Metadata Harvesting / CERN / Role-based access control / Document server / BASE / Digital libraries / Open access / Information science

CDS Invenio for admins http://cdsware.cern.ch/invenio/doc/uoamsd2008_admins.pdf Samuele Kaplun – CERN Document Server team Using Open Access Models for Science Dissemination [10th July 2008]

Add to Reading List

Source URL: invenio-software.org

Language: English - Date: 2008-07-10 17:03:52
163XACML / Role-based access control / PERMIS / Role hierarchy / OASIS / Security / Computer security / Access control

3 XACML Profile for Role Based Access Control (RBAC) 4

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2004-07-19 15:32:40
164Role-based access control / Identity management / Role hierarchy / Discretionary access control / Mandatory access control / Lattice-based access control / AGDLP / Delegation in IT / Computer security / Security / Access control

OBSERVATIONS ON THE REAL-WORLD IMPLEMENTATION OF ROLE-BASED ACCESS CONTROL Burkhard Hilchenbach Schumann Security Software, Inc. 314 Marshall Road

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
165Role-based access control / Role hierarchy / PERMIS / XACML / Delegation in IT / AGDLP / Security / Access control / Computer security

Microsoft Word - Healthcare RBAC TF Role Engineering Process v3.0.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-31 15:50:04
166Role-based access control / XACML / PERMIS / Authorization / Workflow / Security / Access control / Computer security

This paper describes the implementation of a Role Based Access

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
167Identity management / XACML / Access control / Security Assertion Markup Language / PERMIS / Role-based access control / OASIS / Authorization / XML / Computing / Security / Computer security

Microsoft Word - draft-xacml-schema-policy-15.doc

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2002-08-30 07:36:51
168Discretionary access control / Mandatory access control / Access Control Matrix / Role-based access control / Capability-based security / Authorization / Type enforcement / Bell–LaPadula model / Computer security / Security / Access control

NISTIR xxxx, Policy Machine: Features, Architecture, and Specification

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:38:25
169Access control / PERMIS / Role-based access control / Type enforcement / Discretionary access control / Attrib / Security-Enhanced Linux / Multilevel security / Database management system / Computer security / Security / Computing

Proceedings Template - WORD

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:22:00
170Role-based access control / Role hierarchy / PERMIS / NIST RBAC model / Delegation in IT / AGDLP / Computer security / Security / Access control

DRAFT[removed]BSR INCITS 359 American National Standard

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-04-03 20:24:29
UPDATE