Role-based access control

Results: 239



#Item
181Identity management / Role-based access control / Access Control Matrix / Separation of mechanism and policy / S10 / Security policy / Security / Computer security / Access control

The Computational Complexity of Enforceability Validation for Generic Access Control Rules Vincent C. Hu, D. Richard Kuhn, and David F. Ferraiolo National Institute of Standards and Technology, Gaithersburg, Maryland 208

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-26 01:00:00
182Access control / PERMIS / Role-based access control / Type enforcement / Discretionary access control / Attrib / Security-Enhanced Linux / Multilevel security / Database management system / Computer security / Security / Computing

Composing and Combining Policies under the Policy Machine David F. Ferraiolo, Serban Gavrila*, Vincent Hu, D. Richard Kuhn National Institute of Standards and Technology Gaithersburg, MD 20899 +[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-26 01:00:00
183Federated identity / Internet standards / Identity management / PERMIS / Shibboleth / Authentication / Security token / Middleware / Role-based access control / Security / Computer security / Access control

Identity Access Management for Multi-tier Cloud Infrastructures Mohammad Faraji, Joon-Myung Kang, Hadi Bannazadeh, and Alberto Leon-Garcia Department of Electrical and Computer Engineering University of Toronto, Toronto,

Add to Reading List

Source URL: www.savinetwork.ca

Language: English - Date: 2014-02-10 14:58:34
184Access control / Mandatory access control / Information security / Security controls / XACML / Role-based access control / Health Insurance Portability and Accountability Act / Security policy / Trusted Computer System Evaluation Criteria / Security / Computer security / Data security

Control Family & Class

Add to Reading List

Source URL: www.cms.gov

Language: English - Date: 2013-11-20 12:11:33
185Access control / Federated identity / Security Assertion Markup Language / Authentication / XACML / Role-based access control / Electronic authentication / OpenID / Federated identity management / Security / Identity management / Computer security

ATTRIBUTE BASED ACCESS CONTROL Draft February 21, 2014 [removed]

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2014-06-30 15:11:20
186Role-based access control / XACML / Discretionary access control / PERMIS / Information security / Authorization / Security management / Capability-based security / Federal Information Security Management Act / Security / Computer security / Access control

Microsoft Word - NISTIR-7316.doc

Add to Reading List

Source URL: www.mobileworkexchange.com

Language: English - Date: 2013-11-04 15:18:30
187Access control / Information security / National security / Role-based access control / Security controls / Password / Database security / Trusted Computer System Evaluation Criteria / Security / Computer security / Data security

Control Family & Class

Add to Reading List

Source URL: www.cms.gov

Language: English - Date: 2013-11-20 12:11:50
188Role-based access control / PERMIS / Security / Access control / Computer security

Microsoft Word - FR[removed]Final Report.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-12 14:11:31
189Access control / Windows Server / Role-based access control / Virtual machines / Hyper-V / PERMIS / Social vulnerability / Logical partition / Cloud computing / System software / Security / Computing

CERIAS Tech Report[removed]Risk-Aware Virtual Resource Management for Access Control-Based Cloud Datacenters by Abdulrahman Almutairi, Arif Ghafoor Center for Education and Research Information Assurance and Security Purd

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2014-07-31 11:03:37
190Library science / Copyright law of the United States / Copyright / Filesystem permissions / Permission / Role-based access control / Security / Intellectual property law / Data / Information

Microsoft Word - PermissionRequest20050327.doc

Add to Reading List

Source URL: www.upenn.edu

Language: English - Date: 2005-03-27 17:32:21
UPDATE