Role-based access control

Results: 239



#Item
201Role-based access control / Mandatory access control / Discretionary access control / Authentication / XACML / Security / Computer security / Access control

ITL Security Bulletin, Attribute Based Access Conctrol (ABAC) Definition and Considerations, (March 2014)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-03-07 11:05:57
202XACML / Role-based access control / Authorization / Mandatory access control / Discretionary access control / PERMIS / Computer security / Security / Access control

Enterprise Policy Management with Semantic Technologies Evren Sirin, CTO Clark & Parsia, LLC [removed]

Add to Reading List

Source URL: static59.mediabistro.com

Language: English - Date: 2011-11-18 15:23:10
203Identity management / Role-based access control / XACML / Computer network security / National security / PERMIS / Authorization / Directory service / Filesystem permissions / Security / Computer security / Access control

WORKING DRAFT A SURVEY OF ACCESS CONTROL MODELS INTRODUCTION Computer systems and the information that they create, process, transfer, and store have become indispensable to the modern enterprise. In today’s on-demand,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-08-31 01:00:00
204Computer network security / Role-based access control / Network Access Control / Hotspot / RADIUS / Security / Access control / Computer security

PDF Document

Add to Reading List

Source URL: seanconvery.com

Language: English - Date: 2009-03-20 22:07:29
205Java enterprise platform / Java specification requests / Object-oriented programming / Java remote method invocation / Enterprise JavaBeans / Java / Annotation / Class / Application programming interface / Computing / Computing platforms / Java programming language

Role-Based Access Control (RBAC) in Java via Proxy Objects using Annotations Jeff Zarnett [removed] Mahesh Tripunitara

Add to Reading List

Source URL: 21w.ca

Language: English - Date: 2014-02-12 18:13:43
206Crime prevention / National security / Role-based access control / Unix / Operating system / Su / BoKS / Grsecurity / Security / Computer security / Access control

Secure4Privilege S4Software, Inc. Addressing system acccess

Add to Reading List

Source URL: www.s4software.com

Language: English - Date: 2010-03-23 17:54:52
207Data management / Role-based access control / IBM Informix / Oracle Database / Adaptive Server Enterprise / IBM DB2 / Sybase / Oracle Corporation / Database management system / Relational database management systems / Computing / Software

Role-Based Access Control Features in Commercial Database Management Systems Chandramouli Ramaswamy Computer Security Division, ITL NIST, Gaithersburg, Maryland 20899

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
208Identity management / Role-based access control / Unix / Role hierarchy / PERMIS / Theta role / Group / Function / Filesystem permissions / Security / Access control / Computer security

INHERITANCE PROPERTIES OF ROLE HIERARCHIES W.A. Jansen National Institute of Standards and Technology Gaithersburg, MD 20899, USA [removed] Abstract: Role Based Access Control (RBAC) refers to a class of security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
209Computer network security / Data security / NIST RBAC model / Role-based access control / PERMIS / Evaluation / Common Criteria / International Committee for Information Technology Standards / Delegation in IT / Computer security / Security / Access control

Implementation and Interoperability of Role Based Access Control RBAC Implementation and Interoperability Standard (RIIS) INCITS CS1.1 RBAC Task Group

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-09-23 01:00:00
210Computing / Software / Model checkers / Model checking / Logic in computer science / NuSMV / Software testing / Formal verification / Role-based access control / Formal methods / Access control / Security

Property Verification for Generic Access Control Models1 Vincent C. Hu1, D. Richard Kuhn1, Tao Xie2 1 National Institute of Standards and Technology, 2North Carolina State University [removed], [removed], xie@csc.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-05-06 01:00:00
UPDATE