Role-based access control

Results: 239



#Item
11PhD Dissertation  International Doctorate School in Information and Communication Technologies  DIT - University of Trento

PhD Dissertation International Doctorate School in Information and Communication Technologies DIT - University of Trento

Add to Reading List

Source URL: disi.unitn.it

Language: English - Date: 2014-09-10 09:40:14
12CON 2324 A Practical Guide to Role Engineering Shawn McKinney October 27, 2015 JavaOne

CON 2324 A Practical Guide to Role Engineering Shawn McKinney October 27, 2015 JavaOne

Add to Reading List

Source URL: iamfortress.files.wordpress.com

Language: English - Date: 2016-07-28 18:23:00
13Access control / Role-based access control / Ls / Zip / Email / Counterpoint / Outlook.com

COUNTERPOINT/SOFT SKULL PERMISSIONS REQUEST FORM If you are using an excerpt or selection from one of our books you must secure written permission. Please fill out our permissions request form and send by email to permi

Add to Reading List

Source URL: softskull.com

Language: English - Date: 2015-10-09 13:23:11
14COUNTERPOINT/SOFT	
  SKULL	
  PERMISSIONS	
  REQUEST	
  FORM	
   	
   If	
  you	
  are	
  using	
  an	
  excerpt	
  or	
  selection	
  from	
  one	
  of	
  our	
  books	
  you	
  must	
  secure	
  w

COUNTERPOINT/SOFT  SKULL  PERMISSIONS  REQUEST  FORM     If  you  are  using  an  excerpt  or  selection  from  one  of  our  books  you  must  secure  w

Add to Reading List

Source URL: softskull.com

Language: English - Date: 2015-10-09 13:23:09
15Role-Based Access Control for e-Service Integration Peter Lamb, Robert Power, Gavin Walker and Michael Compton CSIRO ICT Centre GPO Box 664 Canberra ACT 2601 Australia +

Role-Based Access Control for e-Service Integration Peter Lamb, Robert Power, Gavin Walker and Michael Compton CSIRO ICT Centre GPO Box 664 Canberra ACT 2601 Australia +

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-02 01:58:17
16Intentional Access Management: Making Access Control Usable for End-Users

Intentional Access Management: Making Access Control Usable for End-Users

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-13 14:38:51
17Role Hierarchies and Constraints for Lattice-Based Access Controls Ravi Sandhu* George Mason University & SETA Corporation~*  A b s t r a c t Role-based access control (RBAC) is a promising alternative to

Role Hierarchies and Constraints for Lattice-Based Access Controls Ravi Sandhu* George Mason University & SETA Corporation~* A b s t r a c t Role-based access control (RBAC) is a promising alternative to

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2013-07-22 19:39:21
    18Role-Based Access Control on the Web JOON S. PARK and RAVI SANDHU George Mason University and GAIL-JOON AHN University of North Carolina at Charlotte

    Role-Based Access Control on the Web JOON S. PARK and RAVI SANDHU George Mason University and GAIL-JOON AHN University of North Carolina at Charlotte

    Add to Reading List

    Source URL: www.profsandhu.com

    Language: English - Date: 2008-02-07 14:26:30
      19The ARBAC97 Model for Role-Based Administration of Roles RAVI SANDHU, VENKATA BHAMIDIPATI, and QAMAR MUNAWER George Mason University  In role-based access control (RBAC), permissions are associated with roles and users a

      The ARBAC97 Model for Role-Based Administration of Roles RAVI SANDHU, VENKATA BHAMIDIPATI, and QAMAR MUNAWER George Mason University In role-based access control (RBAC), permissions are associated with roles and users a

      Add to Reading List

      Source URL: www.profsandhu.com

      Language: English - Date: 2008-02-07 14:26:24
        20(7) Constraints for Role-Based Access Control Fang Chen and Ravi S. Sandhu George Mason University, Fairfax, VA

        (7) Constraints for Role-Based Access Control Fang Chen and Ravi S. Sandhu George Mason University, Fairfax, VA

        Add to Reading List

        Source URL: profsandhu.com

        Language: English - Date: 2008-02-07 14:26:04