Role-based access control

Results: 239



#Item
11Semantic Web / Computer security / Access control / Security / Computing / Ontology / Knowledge engineering / Computer access control / Role-based access control / Description logic / Web Ontology Language / Lightweight ontology

PhD Dissertation International Doctorate School in Information and Communication Technologies DIT - University of Trento

Add to Reading List

Source URL: disi.unitn.it

Language: English - Date: 2014-09-10 09:40:14
12Computer security / Security / Access control / Computer access control / Role-based access control / Identity management / PERMIS / JavaOne / NIST RBAC model

CON 2324 A Practical Guide to Role Engineering Shawn McKinney October 27, 2015 JavaOne

Add to Reading List

Source URL: iamfortress.files.wordpress.com

Language: English - Date: 2016-07-28 18:23:00
13Access control / Role-based access control / Ls / Zip / Email / Counterpoint / Outlook.com

COUNTERPOINT/SOFT SKULL PERMISSIONS REQUEST FORM If you are using an excerpt or selection from one of our books you must secure written permission. Please fill out our permissions request form and send by email to permi

Add to Reading List

Source URL: softskull.com

Language: English - Date: 2015-10-09 13:23:11
14Access control / Role-based access control / Ls / Zip / Email / Counterpoint / Outlook.com

COUNTERPOINT/SOFT  SKULL  PERMISSIONS  REQUEST  FORM     If  you  are  using  an  excerpt  or  selection  from  one  of  our  books  you  must  secure  w

Add to Reading List

Source URL: softskull.com

Language: English - Date: 2015-10-09 13:23:09
15Computer access control / Access control / XACML / Role-based access control / PERMIS / Authorization / Role hierarchy / Data integration / Spring Framework / Attribute-Based Access Control / OAuth

Role-Based Access Control for e-Service Integration Peter Lamb, Robert Power, Gavin Walker and Michael Compton CSIRO ICT Centre GPO Box 664 Canberra ACT 2601 Australia +

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 01:58:17
16Computer access control / Access control / Access control list / Mandatory access control / Role-based access control / Privilege / WebDAV / User / PERMIS / Capability-based security / Superuser / NTFS

Intentional Access Management: Making Access Control Usable for End-Users

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-13 14:38:51
17

Role Hierarchies and Constraints for Lattice-Based Access Controls Ravi Sandhu* George Mason University & SETA Corporation~* A b s t r a c t Role-based access control (RBAC) is a promising alternative to

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2013-07-22 19:39:21
    18

    Role-Based Access Control on the Web JOON S. PARK and RAVI SANDHU George Mason University and GAIL-JOON AHN University of North Carolina at Charlotte

    Add to Reading List

    Source URL: www.profsandhu.com

    Language: English - Date: 2008-02-07 14:26:30
      19

      The ARBAC97 Model for Role-Based Administration of Roles RAVI SANDHU, VENKATA BHAMIDIPATI, and QAMAR MUNAWER George Mason University In role-based access control (RBAC), permissions are associated with roles and users a

      Add to Reading List

      Source URL: www.profsandhu.com

      Language: English - Date: 2008-02-07 14:26:24
        20

        (7) Constraints for Role-Based Access Control Fang Chen and Ravi S. Sandhu George Mason University, Fairfax, VA

        Add to Reading List

        Source URL: profsandhu.com

        Language: English - Date: 2008-02-07 14:26:04
          UPDATE