Role-based access control

Results: 239



#Item
21Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2008-02-07 14:26:30
    22Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

    Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

    Add to Reading List

    Source URL: profsandhu.com

    Language: English - Date: 2008-02-07 14:26:30
      23Role Hierarchies and Constraints for Lattice-Based Access Controls Ravi Sandhu* George Mason University & SETA Corporation~*  A b s t r a c t Role-based access control (RBAC) is a promising alternative to

      Role Hierarchies and Constraints for Lattice-Based Access Controls Ravi Sandhu* George Mason University & SETA Corporation~* A b s t r a c t Role-based access control (RBAC) is a promising alternative to

      Add to Reading List

      Source URL: www.profsandhu.com

      Language: English - Date: 2013-07-22 19:39:21
        24ROWLBAC - Representing Role Based Access Control in OWL T. Finin, A. Joshi Univ. of Maryland, Baltimore County

        ROWLBAC - Representing Role Based Access Control in OWL T. Finin, A. Joshi Univ. of Maryland, Baltimore County

        Add to Reading List

        Source URL: profsandhu.com

        Language: English - Date: 2008-06-15 19:40:50
          25(7) Constraints for Role-Based Access Control Fang Chen and Ravi S. Sandhu George Mason University, Fairfax, VA

          (7) Constraints for Role-Based Access Control Fang Chen and Ravi S. Sandhu George Mason University, Fairfax, VA

          Add to Reading List

          Source URL: www.profsandhu.com

          Language: English - Date: 2008-02-07 14:26:04
            26Role-Based Access Control Features in Commercial Database Management Systems Chandramouli Ramaswamy Computer Security Division, ITL NIST, Gaithersburg, Maryland 20899

            Role-Based Access Control Features in Commercial Database Management Systems Chandramouli Ramaswamy Computer Security Division, ITL NIST, Gaithersburg, Maryland 20899

            Add to Reading List

            Source URL: profsandhu.com

            Language: English - Date: 2008-02-07 14:26:04
              27Tie-RBAC: An application of RBAC to Social Networks Antonio Tapiador, Diego Carrera, Joaquín Salvachúa Universidad Politécnica de Madrid Abstract This paper explores the application of role-based access control to soc

              Tie-RBAC: An application of RBAC to Social Networks Antonio Tapiador, Diego Carrera, Joaquín Salvachúa Universidad Politécnica de Madrid Abstract This paper explores the application of role-based access control to soc

              Add to Reading List

              Source URL: w2spconf.com

              Language: English - Date: 2012-02-07 16:10:02
              28Future Directions in Role-Based Access Control Models Ravi Sandhu Chief Scientist, SingleSignOn.Net IncSunset Hills Road, Reston, VA 20190, USA , www.singlesignon.net &

              Future Directions in Role-Based Access Control Models Ravi Sandhu Chief Scientist, SingleSignOn.Net IncSunset Hills Road, Reston, VA 20190, USA , www.singlesignon.net &

              Add to Reading List

              Source URL: profsandhu.com

              Language: English - Date: 2008-02-07 14:26:02
                29White Paper  The Role of Knowledge Based Authentication (KBA) In Identity Proofing  Knowledge Based Authentication [KBA]

                White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA]

                Add to Reading List

                Source URL: lexisnexis.com

                Language: English - Date: 2014-10-15 08:44:07
                30Role-Based Access Control (RBAC) in Java via Proxy Objects using Annotations Jeff Zarnett   Mahesh Tripunitara

                Role-Based Access Control (RBAC) in Java via Proxy Objects using Annotations Jeff Zarnett Mahesh Tripunitara

                Add to Reading List

                Source URL: patricklam.ca

                Language: English - Date: 2015-09-18 09:21:47