Role-based access control

Results: 239



#Item
21

Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2008-02-07 14:26:30
    22

    Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies SYLVIA OSBORN The University of Western Ontario and

    Add to Reading List

    Source URL: profsandhu.com

    Language: English - Date: 2008-02-07 14:26:30
      23

      Role Hierarchies and Constraints for Lattice-Based Access Controls Ravi Sandhu* George Mason University & SETA Corporation~* A b s t r a c t Role-based access control (RBAC) is a promising alternative to

      Add to Reading List

      Source URL: www.profsandhu.com

      Language: English - Date: 2013-07-22 19:39:21
        24

        ROWLBAC - Representing Role Based Access Control in OWL T. Finin, A. Joshi Univ. of Maryland, Baltimore County

        Add to Reading List

        Source URL: profsandhu.com

        Language: English - Date: 2008-06-15 19:40:50
          25

          (7) Constraints for Role-Based Access Control Fang Chen and Ravi S. Sandhu George Mason University, Fairfax, VA

          Add to Reading List

          Source URL: www.profsandhu.com

          Language: English - Date: 2008-02-07 14:26:04
            26

            Role-Based Access Control Features in Commercial Database Management Systems Chandramouli Ramaswamy Computer Security Division, ITL NIST, Gaithersburg, Maryland 20899

            Add to Reading List

            Source URL: profsandhu.com

            Language: English - Date: 2008-02-07 14:26:04
              27Computer security / Security / Access control / Computer access control / Role-based access control / PERMIS / Mandatory access control / Social networking service / Interpersonal ties / Social network / NIST RBAC model

              Tie-RBAC: An application of RBAC to Social Networks Antonio Tapiador, Diego Carrera, Joaquín Salvachúa Universidad Politécnica de Madrid Abstract This paper explores the application of role-based access control to soc

              Add to Reading List

              Source URL: w2spconf.com

              Language: English - Date: 2012-02-07 16:10:02
              28

              Future Directions in Role-Based Access Control Models Ravi Sandhu Chief Scientist, SingleSignOn.Net IncSunset Hills Road, Reston, VA 20190, USA , www.singlesignon.net &

              Add to Reading List

              Source URL: profsandhu.com

              Language: English - Date: 2008-02-07 14:26:02
                29Identity management / Computer access control / Computer network security / Authentication / Notary / Packaging / Knowledge-based authentication / Layered security / Analytics / Identity verification service / LexisNexis

                White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA]

                Add to Reading List

                Source URL: lexisnexis.com

                Language: English - Date: 2014-10-15 08:44:07
                30

                Role-Based Access Control (RBAC) in Java via Proxy Objects using Annotations Jeff Zarnett Mahesh Tripunitara

                Add to Reading List

                Source URL: patricklam.ca

                Language: English - Date: 2015-09-18 09:21:47
                  UPDATE