Role-based access control

Results: 239



#Item
211Identity management / Role-based access control / Role hierarchy / Theta role / PERMIS / Filesystem permissions / Solid-state drive / Group / Delegation in IT / Security / Access control / Computer security

NISTIR[removed]A REVISED MODEL FOR ROLE-BASED ACCESS CONTROL W. A. Jansen July 9, 1998

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
212Role-based access control / PERMIS / International Committee for Information Technology Standards / Identity management / NIST RBAC model / Security / Computer security / Access control

Microsoft PowerPoint - CS1 RBAC Standards ( DU_13Jan2011_Weil)_v1.1.ppt [Compatibility Mode]

Add to Reading List

Source URL: securityfeeds.com

Language: English - Date: 2012-01-12 20:38:19
213XACML / Computer network security / Vulnerability / Social vulnerability / Role-based access control / Authorization / Mandatory access control / Grant / Business rules engine / Security / Computer security / Access control

Vulnerability Hierarchies in Access Control Configurations D. Richard Kuhn National Institute of Standards and Technology Gaithersburg, MD[removed]removed] Abstract— This paper applies methods for analyzing fault hi

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-14 10:10:42
214Role-based access control / PERMIS / XACML / Filesystem permissions / Modes / AGDLP / Delegation in IT / Security / Computer security / Access control

Insecure IT ABAC and RBAC: © Route66 | Dreamstime.com Scalable, Flexible,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-06-10 10:45:29
215Role-based access control / Database management system / Mandatory access control / AGDLP / Security / Access control / Computer security

Business Process Driven Framework for defining an Access Control Service based on Roles and Rules Ramaswamy Chandramouli Computer Security Division, ITL NIST, Gaithersburg, MD[removed]removed])

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
216Access control list / Filesystem permissions / Operating system / Capability-based security / File system / Unix / Kernel / Group identifier / Role-based access control / Security / Computer security / Access control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
217Access control / Identity management / Role-based access control / Information security / National Institute of Standards and Technology / Federal Information Security Management Act / Security / Computer security / Data security

Guide to Attribute Based Access Control (ABAC) Definition and Considerations

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-05-20 17:06:05
218Access control / System administration / Access control list / Filesystem permissions / Mandatory access control / Operating system / File system / Role-based access control / Computer file / System software / Computing / Computer security

CHAPTER 4 Access Control Going all the way back to early time-sharing systems we systems

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:17
219Privacy / Bell–LaPadula model / Multilevel security / Classified information / Role-based access control / Mandatory access control / Information privacy / National Security Agency / Medical privacy / Computer security / Security / National security

CHAPTER 9 Multilateral Security Privacy is a transient notion. It started when people stopped believing that God could see everything and stopped when

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:06:46
220Role-based access control / Authorization / Service-oriented architecture / PERMIS / Security / Access control / Computer security

White Paper on Enterprise Authorization Large organizations typically operate through a federated structure, with control over knowledge, process, system and data decentralized across various business units. Federated op

Add to Reading List

Source URL: www.objectedge.com

Language: English - Date: 2013-09-24 08:21:02
UPDATE