Role-based access control

Results: 239



#Item
191NuSMV / Model checking / Role-based access control / XACML / Access control / Security / Model checkers

Access Control Policy Authori Tool

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-07 00:00:00
192Computing / Software / Model checkers / Model checking / Logic in computer science / NuSMV / Software testing / Formal verification / Role-based access control / Formal methods / Access control / Security

Property Verification for Generic Access Control Models1 Vincent C. Hu1, D. Richard Kuhn1, Tao Xie2 1 National Institute of Standards and Technology, 2North Carolina State University [removed], [removed], xie@csc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-01-07 00:00:00
193Authentication / National Institute of Standards and Technology / Attribute / XACML / Security / Access control / Role-based access control

Access Control Policy Authori Tool

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-08-07 11:17:05
194Role-based access control / PERMIS / Security / Access control / Computer security

ANSI Enhanced RBAC Standard, or Adding Attributes to RBAC

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-08-07 12:02:30
195XACML / Identity management / PERMIS / Role-based access control / Policy analysis / Authorization / Distributed firewall / Policy / Information security / Security / Computer security / Access control

C:/Documents and Settings/JeeHyun Hwang/Desktop/ssiri-camera-ready-2June/Camera-ready-SSIRI09-8may/ssiri-camera-ready-2June/Camera-ready-SSIRI09-8may/jhwang4_ssiri09.dvi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-11-16 00:00:00
196Intellectual property law / Copyright / Data management / Monopoly / Filesystem permissions / B.C. / Internet privacy / Role-based access control / Secret Chiefs 3 / Data / Information / Library science

Microsoft Word - Permissions application and agreement.doc

Add to Reading List

Source URL: www.ubcic.bc.ca

Language: English - Date: 2012-03-29 22:05:34
197Identity management / XACML / PERMIS / Role-based access control / Security Assertion Markup Language / Authorization / OASIS / Discretionary access control / Model checking / Security / Computer security / Access control

Conformance Checking of Access Control Policies Specified in XACML Vincent C. Hu1 1 Evan Martin2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-11-16 00:00:00
198Mandatory access control / Model checking / Role-based access control / Computation tree logic / PERMIS / Security / Computer security / Access control

May 27, [removed]:33 WSPC/117-IJSEKE S021819401100513X -

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-03 09:41:10
199Role-based access control / Identity management / Computer network security / National Institute of Standards and Technology / National Security Agency / National Strategy for Trusted Identities in Cyberspace / Security / Access control / Computer security

Attribute Based Access Control Workshop, Rockville, Maryland, July 17th, 2013

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2013-07-16 12:26:59
200Access control / Role-based access control / Computer network security / Mandatory access control / Authorization / Information security management system / Information security / NIST RBAC model / Computer security / Security / Data security

NISTIR 7987, Policy Machine: Features, Architecture, and Specification

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-07-02 10:19:30
UPDATE