Role-based access control

Results: 239



#Item
31Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study Lars Hamann, Karsten Sohr, and Martin Gogolla University of Bremen, Computer Science Department DBremen, Germany {lhamann,sohr,gog

Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study Lars Hamann, Karsten Sohr, and Martin Gogolla University of Bremen, Computer Science Department DBremen, Germany {lhamann,sohr,gog

Add to Reading List

Source URL: www.db.informatik.uni-bremen.de

Language: English - Date: 2014-12-06 08:06:31
32A Framework for Role-Based Access Control in Group Communication Systems Cristina Nita-Rotaru and Ninghui Li Department of Computer Sciences and CERIAS Purdue University 250 N. University Street

A Framework for Role-Based Access Control in Group Communication Systems Cristina Nita-Rotaru and Ninghui Li Department of Computer Sciences and CERIAS Purdue University 250 N. University Street

Add to Reading List

Source URL: homes.cerias.purdue.edu

Language: English - Date: 2004-07-23 09:04:46
    33A Framework for Role-Based Access Control in Group Communication Systems Cristina Nita-Rotaru and Ninghui Li Department of Computer Sciences Purdue University West Lafayette, IN 47907

    A Framework for Role-Based Access Control in Group Communication Systems Cristina Nita-Rotaru and Ninghui Li Department of Computer Sciences Purdue University West Lafayette, IN 47907

    Add to Reading List

    Source URL: homes.cerias.purdue.edu

    Language: English - Date: 2004-07-25 11:03:05
      3436 International Journal of Information Security and Privacy, 7(3), 36-52, July-SeptemberA Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain

      36 International Journal of Information Security and Privacy, 7(3), 36-52, July-SeptemberA Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain

      Add to Reading List

      Source URL: www.tyronegrandison.org

      Language: English - Date: 2013-12-05 23:52:20
        35λ-RBAC: Programming with Role-Based Access Control Radha Jagadeesan1,? , Alan Jeffrey2,? , Corin Pitcher1?? , and James Riely1,? ? ? 1 2  School of CTI, DePaul University

        λ-RBAC: Programming with Role-Based Access Control Radha Jagadeesan1,? , Alan Jeffrey2,? , Corin Pitcher1?? , and James Riely1,? ? ? 1 2 School of CTI, DePaul University

        Add to Reading List

        Source URL: ect.bell-labs.com

        Language: English - Date: 2010-12-15 21:37:48
        36Logical Methods in Computer Science Volume 00, Number 0, Pages 000–000 SXX λ -RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL RADHA JAGADEESAN, ALAN JEFFREY, CORIN PITCHER, AND JAMES RIELY

        Logical Methods in Computer Science Volume 00, Number 0, Pages 000–000 SXX λ -RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL RADHA JAGADEESAN, ALAN JEFFREY, CORIN PITCHER, AND JAMES RIELY

        Add to Reading List

        Source URL: ect.bell-labs.com

        Language: English - Date: 2010-12-15 21:38:34
        37The ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Venkata Bhamidipati

        The ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Venkata Bhamidipati

        Add to Reading List

        Source URL: www.profsandhu.com

        Language: English - Date: 2008-05-30 14:05:08
          38ADMINISTRATIVE MODELS FOR ROLE-BASED ACCESS CONTROL by Committee:

          ADMINISTRATIVE MODELS FOR ROLE-BASED ACCESS CONTROL by Committee:

          Add to Reading List

          Source URL: www.profsandhu.com

          Language: English - Date: 2008-02-07 14:26:16
            39Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance

            Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance

            Add to Reading List

            Source URL: www.niap-ccevs.org

            Language: English - Date: 2009-10-08 10:40:04
            40View access control as a matrix  Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

            View access control as a matrix Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

            Add to Reading List

            Source URL: www.scs.stanford.edu

            Language: English - Date: 2010-03-04 18:26:58