Role-based access control

Results: 239



#Item
41Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA,  Stephen Smalley, NAI Labs,  Abstract The protection mechanisms of current mai

Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, Stephen Smalley, NAI Labs, Abstract The protection mechanisms of current mai

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
42Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2008-04-25 16:21:05
43THE FLORIDA AGRICULTURAL AND MECHANICAL UNIVERSITY  COLLEGE OF ARTS AND SCIENCES A Role-based Access Control Security Model for Workflow Management System in an E-healthcare Enterprise

THE FLORIDA AGRICULTURAL AND MECHANICAL UNIVERSITY COLLEGE OF ARTS AND SCIENCES A Role-based Access Control Security Model for Workflow Management System in an E-healthcare Enterprise

Add to Reading List

Source URL: www.cis.famu.edu

Language: English - Date: 2009-01-14 09:27:09
    44Under consideration for publication in Math. Struct. in Comp. Science  Employing UML and OCL for Designing and Analyzing Role-Based Access Control M I R C O K U H L M A N N1 , K A R S T E N S O H R2 and M A R T I N G O G

    Under consideration for publication in Math. Struct. in Comp. Science Employing UML and OCL for Designing and Analyzing Role-Based Access Control M I R C O K U H L M A N N1 , K A R S T E N S O H R2 and M A R T I N G O G

    Add to Reading List

    Source URL: www.db.informatik.uni-bremen.de

    Language: English - Date: 2013-01-10 06:30:23
      45UML/OCL based Design and Analysis of Role-Based Access Control Policies Oliver Hofrichter, Martin Gogolla, and Karsten Sohr University of Bremen, Computer Science Department Database Systems Group, DBremen, German

      UML/OCL based Design and Analysis of Role-Based Access Control Policies Oliver Hofrichter, Martin Gogolla, and Karsten Sohr University of Bremen, Computer Science Department Database Systems Group, DBremen, German

      Add to Reading List

      Source URL: www.db.informatik.uni-bremen.de

      Language: English - Date: 2014-12-03 04:25:47
        46R O L E A N D L O C AT I O N B A S E D A C C E S S C O N T R O L USING SEMANTIC WEB TECHNOLOGIES sandro cirulli student number: supervisor: professor david duce module: p00998 - msc dissertation

        R O L E A N D L O C AT I O N B A S E D A C C E S S C O N T R O L USING SEMANTIC WEB TECHNOLOGIES sandro cirulli student number: supervisor: professor david duce module: p00998 - msc dissertation

        Add to Reading List

        Source URL: sandrocirulli.net

        Language: English - Date: 2015-05-17 14:55:32
        47Security Engineering: A Guide to Building Dependable Distributed Systems  C H A P TE R 4 Access Control

        Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2006-12-30 11:29:19
        48CHAPTER  4 Access Control Going all the way back to early time-sharing systems we systems

        CHAPTER 4 Access Control Going all the way back to early time-sharing systems we systems

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2011-12-05 05:23:17
        49CHAPTER  9 Multilateral Security Privacy is a transient notion. It started when people stopped believing that God could see everything and stopped when

        CHAPTER 9 Multilateral Security Privacy is a transient notion. It started when people stopped believing that God could see everything and stopped when

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2011-12-05 05:06:46
        50Paper Title (use style: paper title)

        Paper Title (use style: paper title)

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2013-06-07 14:08:57