Role-based access control

Results: 239



#Item
81Aircraft maintenance / Role-based access control / National aviation authority / Aviation / Civil aviation authorities / Airworthiness

INTRODUCTION This document contains an updated revision, up to August 2013, of the Sample Supplement from the “Implementation Procedures for the Technical Arrangement on Aviation Maintenance between the TCCA, Canada an

Add to Reading List

Source URL: www2.anac.gov.br

Language: English - Date: 2013-10-11 15:35:12
82Identity management / Heuristic evaluation / Usability inspection / Usability / Computer security / PERMIS / Heuristic / Role-based access control / User interfaces / Security / Access control

Poster: Helping users review and make sense of access policies in organizations Pooya Jaferian Hootan Rashtian

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:52
83Public safety / Crime prevention / Information security / National security / Certified Information Systems Security Professional / Role-based access control / Certified Information Security Manager / Security / Data security / Computer security

Microsoft Word - ISR&R Version 2 Data Sheet _2page_.doc

Add to Reading List

Source URL: www.informationshield.com

Language: English - Date: 2012-02-08 06:58:16
84Access control / Computer security / Information retrieval / Collaborative filtering / Social information processing / Recommender system / Role-based access control / Shared resource / Document collaboration / Collaboration / Security / Computing

Using Recommenders for Discretionary Access Control Suresh Chari Larry Koved Mary Ellen Zurko IBM Research IBM Software Group

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
85Science / Information / Invenio / Open Archives Initiative Protocol for Metadata Harvesting / CERN / Role-based access control / Document server / BASE / Digital libraries / Open access / Information science

CDS Invenio for admins http://cdsware.cern.ch/invenio/doc/uoamsd2008_admins.pdf Samuele Kaplun – CERN Document Server team Using Open Access Models for Science Dissemination [10th July 2008]

Add to Reading List

Source URL: cdsware.cern.ch

Language: English - Date: 2008-07-10 17:03:52
86Computer security / Role-based access control / Privacy / Policy / PERMIS / Internet privacy / Security / Identity management / Access control

PhD Dissertation Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments Muhammad Rizwan Asghar

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-22 13:27:24
87Crime prevention / National security / Database management systems / Role-based access control / Mandatory access control / Principle of least privilege / Label / Database / Internet privacy / Security / Computer security / Access control

An Enhanced IFC Label Model to meet Application Policy Requirements. Thomas F. J.-M. Pasquier1 , Olivier Hermant2 , Jean Bacon1 1 University of Cambridge, United Kingdom,

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2015-01-06 10:49:17
88Database management systems / Cloud computing / Database / Mandatory access control / Role-based access control / Stream processing / Industry Foundation Classes / Security / Computing / Access control

An Information Flow Control Model for the Cloud Thomas F. J.-M. Pasquier, Jatinder Singh and Jean Bacon Olivier Hermant Computer Laboratory, University of Cambridge

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2015-02-19 09:07:45
89Computer network security / Access control / Software testing / Data security / Information security / Managed security service / Unix / Role-based access control / Vulnerability / Security / Computer security / Cyberwarfare

SPECIALIST PROFILE Personal Details Reference: BT2691

Add to Reading List

Source URL: www.bmeurope.com

Language: English - Date: 2013-04-26 11:30:25
90Risk management / Identity management / Actuarial science / XACML / Role-based access control / Risk / PERMIS / Mandatory access control / Discretionary access control / Security / Computer security / Access control

Towards Attribute-based Access Control Policy Engineering Using Risk∗ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consiglio Nazionale delle R

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2014-09-19 11:36:58
UPDATE