Role-based access control

Results: 239



#Item
51Supporting Heterogeneous Middleware Security Policies in WebCom Simon N. Foley∗, Barry P. Mulcahy, Thomas B. Quillinan, Meabh O’Connor, and John P. Morrison Department of Computer Science, University College, Cork, I

Supporting Heterogeneous Middleware Security Policies in WebCom Simon N. Foley∗, Barry P. Mulcahy, Thomas B. Quillinan, Meabh O’Connor, and John P. Morrison Department of Computer Science, University College, Cork, I

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2006-08-23 05:01:03
52Reconfiguring Role Based Access Control Policies Using Risk Semantics Benjamin Aziz? Simon N. Foley† Garret Swart‡

Reconfiguring Role Based Access Control Policies Using Risk Semantics Benjamin Aziz? Simon N. Foley† Garret Swart‡

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2006-08-23 04:53:26
53World Leading Discovery Technology ViewDS Identity Solutions is a suite of Identity and Access Management capabilities designed for Directory and Discovery search, Identity Management,

World Leading Discovery Technology ViewDS Identity Solutions is a suite of Identity and Access Management capabilities designed for Directory and Discovery search, Identity Management,

Add to Reading List

Source URL: www.viewds.com

Language: English - Date: 2015-03-12 00:57:27
54XACML and Role-Based Access Control Jason Crampton Royal Holloway, University of London DIMACS Workshop on Secure Web Services and e-Commerce  XACML and RBAC/Introduction

XACML and Role-Based Access Control Jason Crampton Royal Holloway, University of London DIMACS Workshop on Secure Web Services and e-Commerce XACML and RBAC/Introduction

Add to Reading List

Source URL: www.cs.odu.edu

Language: English - Date: 2008-10-22 10:47:59
55Chapter 1  EDAC and ANSI INCITSRBAC Conformance

Chapter 1 EDAC and ANSI INCITSRBAC Conformance

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
56Microsoft Word - FinCom2007fpost.doc

Microsoft Word - FinCom2007fpost.doc

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:13
57An Approach to Engineer and Enforce Context Constraints in an RBAC Environment Gustaf Neumann   Mark Strembeck

An Approach to Engineer and Enforce Context Constraints in an RBAC Environment Gustaf Neumann Mark Strembeck

Add to Reading List

Source URL: wi.wu-wien.ac.at

Language: English - Date: 2015-02-14 09:46:19
58Experiences with the Enforcement of Access Rights Extracted from ODRL-based Digital Contracts Susanne Guth Gustaf Neumann

Experiences with the Enforcement of Access Rights Extracted from ODRL-based Digital Contracts Susanne Guth Gustaf Neumann

Add to Reading List

Source URL: nm.wu-wien.ac.at

Language: English - Date: 2003-09-04 08:49:52
59XACML and Risk-Aware Access Control Luca Gasparini Department of Computing Science University of Aberdeen Aberdeen, United Kingdom

XACML and Risk-Aware Access Control Luca Gasparini Department of Computing Science University of Aberdeen Aberdeen, United Kingdom

Add to Reading List

Source URL: www.dcs.kcl.ac.uk

Language: English - Date: 2013-06-10 04:52:30
60A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments Alessandra Toninelli1, Rebecca Montanari1, Lalana Kagal2, and Ora Lassila3, 1

A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments Alessandra Toninelli1, Rebecca Montanari1, Lalana Kagal2, and Ora Lassila3, 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2006-09-07 14:22:35