Role-based access control

Results: 239



#Item
41National Security Agency / Security-Enhanced Linux / Windows NT architecture / Mandatory access control / Type enforcement / FLASK / Role-based access control / Multilevel security / Capability-based security / Computer security / Security / Access control

Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, Stephen Smalley, NAI Labs, Abstract The protection mechanisms of current mai

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
42Mandatory access control / Access Control Matrix / Role-based access control / XACML / Filesystem permissions / Authorization / Discretionary access control / Mandatory Integrity Control / Security-Enhanced Linux / Computer security / Security / Access control

Delft University of Technology Software Engineering Research Group Technical Report Series Declarative Access Control for WebDSL: Combining Language Integration and

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2008-04-25 16:21:05
43

THE FLORIDA AGRICULTURAL AND MECHANICAL UNIVERSITY COLLEGE OF ARTS AND SCIENCES A Role-based Access Control Security Model for Workflow Management System in an E-healthcare Enterprise

Add to Reading List

Source URL: www.cis.famu.edu

Language: English - Date: 2009-01-14 09:27:09
    44

    Under consideration for publication in Math. Struct. in Comp. Science Employing UML and OCL for Designing and Analyzing Role-Based Access Control M I R C O K U H L M A N N1 , K A R S T E N S O H R2 and M A R T I N G O G

    Add to Reading List

    Source URL: www.db.informatik.uni-bremen.de

    Language: English - Date: 2013-01-10 06:30:23
      45

      UML/OCL based Design and Analysis of Role-Based Access Control Policies Oliver Hofrichter, Martin Gogolla, and Karsten Sohr University of Bremen, Computer Science Department Database Systems Group, DBremen, German

      Add to Reading List

      Source URL: www.db.informatik.uni-bremen.de

      Language: English - Date: 2014-12-03 04:25:47
        46FOAF / Role-based access control / Distributed Access Control System / Lattice-based access control / Password / Semantic Web / PERMIS / Authentication / Security / Access control / Computer security

        R O L E A N D L O C AT I O N B A S E D A C C E S S C O N T R O L USING SEMANTIC WEB TECHNOLOGIES sandro cirulli student number: supervisor: professor david duce module: p00998 - msc dissertation

        Add to Reading List

        Source URL: sandrocirulli.net

        Language: English - Date: 2015-05-17 14:55:32
        47Access control list / Filesystem permissions / Operating system / Capability-based security / File system / Unix / Kernel / Group identifier / Role-based access control / Security / Computer security / Access control

        Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2006-12-30 11:29:19
        48Access control / System administration / Access control list / Filesystem permissions / Mandatory access control / Operating system / File system / Role-based access control / Computer file / System software / Computing / Computer security

        CHAPTER 4 Access Control Going all the way back to early time-sharing systems we systems

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2011-12-05 05:23:17
        49Privacy / Bell–LaPadula model / Multilevel security / Classified information / Role-based access control / Mandatory access control / Information privacy / National Security Agency / Medical privacy / Computer security / Security / National security

        CHAPTER 9 Multilateral Security Privacy is a transient notion. It started when people stopped believing that God could see everything and stopped when

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2011-12-05 05:06:46
        50Role-based access control / PERMIS / Mandatory access control / EXPRESS / Variable and attribute / Database management system / First-order logic / Security / Computer security / Access control

        Paper Title (use style: paper title)

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2013-06-07 14:08:57
        UPDATE