Role-based access control

Results: 239



#Item
221Computing / Cloud clients / Android / Embedded Linux / Smartphones / Role-based access control / Identity management / Mandatory Integrity Control / XACML / Computer security / Security / Access control

Context-Aware Usage Control for Android Guangdong Bai, Liang Gu, Tao Feng, Yao Guo ⋆ , and Xiangqun Chen Key Laboratory of High Confidence Software Technologies (Ministry of Education), Institute of Software, School of

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-12 00:02:10
222Auditing / Data security / National security / Separation of duties / Logical access control / Information technology controls / Information security audit / Role-based access control / Security / Computer security / Access control

Microsoft Word[removed]DCF IBRS.docx

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2012-03-19 08:01:55
223Access control / Semantic Web / Nursing research / XACML / Information science / Knowledge representation / Role-based access control / Ontology / Authorization / Health / Medicine / Science

Microsoft Word - AMIA2013_ResourceMediator Reviewed Clean.docx

Add to Reading List

Source URL: www.ncbi.nlm.nih.gov

Language: English
224Access Control Matrix / Discretionary access control / HRU / Role-based access control / Authorization / Separation of mechanism and policy / Multilevel security / Kernel / Mandatory access control / Computer security / Security / Access control

Access Control: Policies, Models, and Mechanisms Pierangela Samarati1 and Sabrina De Capitani di Vimercati2 1

Add to Reading List

Source URL: spdp.di.unimi.it

Language: English - Date: 2012-12-10 09:50:04
225Access control / Security-Enhanced Linux / FLASK / Mandatory access control / Type enforcement / Multilevel security / Role-based access control / Security Identifier / Operating system / Computer security / Security / System software

Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, [removed]

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2003-12-29 17:06:34
226Data security / Crime prevention / National security / Role-based access control / Separation of duties / Information security / Role hierarchy / Mandatory access control / PERMIS / Security / Computer security / Access control

Master Thesis Computer Science Thesis no: MCS-2006:16

Add to Reading List

Source URL: www.bth.se

Language: English - Date: 2009-06-25 11:14:02
227Access control / HP-UX / System V / Role-based access control / Discretionary access control / Mandatory access control / Common Criteria / PERMIS / Operating system / Computer security / Security / Evaluation

CCOPP-OS HP-UX 11i v3 Common Criteria Security Target

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2010-09-02 21:29:55
228Information theory / Privilege revocation / Evaluation / Mandatory Integrity Control / Ring / Operating system / Data integrity / Unix / Role-based access control / Computer security / Security / LOMAC

PDF Document

Add to Reading List

Source URL: alum.wpi.edu

Language: English - Date: 2004-08-23 17:54:47
229Copyright law / Identity management / Digital rights management / Mandatory access control / Discretionary access control / Access Control Matrix / Role-based access control / Information security / Authorization / Security / Computer security / Access control

PDF Document

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2008-02-07 14:26:30
230Access Control Matrix / Authorization / Information security / Filesystem permissions / Workflow / Delegation in IT / Role-based access control / Security / Computer security / Access control

PDF Document

Add to Reading List

Source URL: profsandhu.com

Language: English - Date: 2008-02-07 14:26:02
UPDATE