Role-based access control

Results: 239



#Item
51Identity management / Computing / Role-based access control / Middleware / PERMIS / Enterprise JavaBeans / Credential / Security / Access control / Systems engineering

Supporting Heterogeneous Middleware Security Policies in WebCom Simon N. Foley∗, Barry P. Mulcahy, Thomas B. Quillinan, Meabh O’Connor, and John P. Morrison Department of Computer Science, University College, Cork, I

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2006-08-23 05:01:03
52Role-based access control / Security-Enhanced Linux / PERMIS / Filesystem permissions / Multilevel security / Delegation in IT / AGDLP / Computer security / Security / Access control

Reconfiguring Role Based Access Control Policies Using Risk Semantics Benjamin Aziz? Simon N. Foley† Garret Swart‡

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2006-08-23 04:53:26
53Computer security / Virtual directory / Lightweight Directory Access Protocol / Identity management / Role-based access control / XML Enabled Directory / Active Directory / XACML / Provisioning / Directory services / Computing / Security

World Leading Discovery Technology ViewDS Identity Solutions is a suite of Identity and Access Management capabilities designed for Directory and Discovery search, Identity Management,

Add to Reading List

Source URL: www.viewds.com

Language: English - Date: 2015-03-12 00:57:27
54Identity management / XACML / Role-based access control / OASIS / Authorization / PERMIS / Security / Computer security / Access control

XACML and Role-Based Access Control Jason Crampton Royal Holloway, University of London DIMACS Workshop on Secure Web Services and e-Commerce XACML and RBAC/Introduction

Add to Reading List

Source URL: www.cs.odu.edu

Language: English - Date: 2008-10-22 10:47:59
55Role-based access control / PERMIS / International Committee for Information Technology Standards / NIST RBAC model / Security / Access control / Computer security

Chapter 1 EDAC and ANSI INCITSRBAC Conformance

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
56National security / Public safety / Data security / Information security / Role-based access control / Vulnerability / User provisioning software / Identity management / Security / Computer security / Crime prevention

Microsoft Word - FinCom2007fpost.doc

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:13
57Process management / Role-based access control / Organisation-based access control / Role hierarchy / PERMIS / Theory of constraints / Process / Security / Access control / Computer security

An Approach to Engineer and Enforce Context Constraints in an RBAC Environment Gustaf Neumann Mark Strembeck

Add to Reading List

Source URL: wi.wu-wien.ac.at

Language: English - Date: 2015-02-14 09:46:19
58Metadata / Digital rights management / Access control / ODRL / Rights Expression Language / Identity management / XrML / Role-based access control / Data model / Data / Information / Computing

Experiences with the Enforcement of Access Rights Extracted from ODRL-based Digital Contracts Susanne Guth Gustaf Neumann

Add to Reading List

Source URL: nm.wu-wien.ac.at

Language: English - Date: 2003-09-04 08:49:52
59Access control / Data security / Risk management / XACML / PERMIS / Role-based access control / Information security / Authorization / IT risk / Security / Risk / Computer security

XACML and Risk-Aware Access Control Luca Gasparini Department of Computing Science University of Aberdeen Aberdeen, United Kingdom

Add to Reading List

Source URL: www.dcs.kcl.ac.uk

Language: English - Date: 2013-06-10 04:52:30
60Computing / Identity management / RDF / Context awareness / PERMIS / Policy analysis / Ontology / Role-based access control / Web Ontology Language / Security / Semantic Web / Access control

A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments Alessandra Toninelli1, Rebecca Montanari1, Lalana Kagal2, and Ora Lassila3, 1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2006-09-07 14:22:35
UPDATE