Role-based access control

Results: 239



#Item
1

Název projektu: Analýza přístupových oprávnění a jejich převod na RBAC (Role Based Access Control) model Vedení projektu: Antonín Beneš

Add to Reading List

Source URL: www.ksi.mff.cuni.cz

Language: Czech - Date: 2008-05-02 01:22:00
    2Computer security / Security / Access control / Computer access control / XACML / PERMIS / Identity management / Role-based access control / Authorization / Model-driven security / PDP / Toolchain

    A Toolchain for Model-Based Design and Testing of Access Control Systems Said Daoudagh1 , Donia El Kateb2 , Francesca Lonetti1 , Eda Marchetti1 and Tejeddine Mouelhi3 1 Istituto di Scienza e Tecnologie dell’Informazio

    Add to Reading List

    Source URL: www.itrust.lu

    Language: English - Date: 2015-03-09 10:06:50
    3Computing / Microsoft / Ls / Email / Role-based access control / Zip / Counterpoint / Outlook.com

    COUNTERPOINT/SOFT  SKULL  PERMISSIONS  REQUEST  FORM     If  you  are  using  an  excerpt  or  selection  from  one  of  our  books  you  must  secure  w

    Add to Reading List

    Source URL: www.counterpointpress.com

    Language: English - Date: 2015-10-09 13:23:09
    4Computing / Microsoft / Ls / Zip / Email / Role-based access control / Counterpoint / Outlook.com

    COUNTERPOINT/SOFT SKULL PERMISSIONS REQUEST FORM If you are using an excerpt or selection from one of our books you must secure written permission. Please fill out our permissions request form and send by email to permi

    Add to Reading List

    Source URL: www.counterpointpress.com

    Language: English - Date: 2015-10-09 13:23:11
    5Computer security / Security / Computer access control / Access control / Identity management / Role-based access control / Access control list / Access Control Matrix / Group / PERMIS / Attribute-Based Access Control

    UNIVERSITY OF TRENTO DIPARTIMENTO DI INGEGNERIA E SCIENZA DELL’INFORMAZIONEPovo – Trento (Italy), Via Sommarive 14 http://www.disi.unitn.it

    Add to Reading List

    Source URL: disi.unitn.it

    Language: English - Date: 2014-09-10 09:40:14
    6Security / Access control / Computer security / Computer access control / Social information processing / Role-based access control / PERMIS / Web 2.0 / Social software / Attribute-Based Access Control

    Journal of Information Assurance and Security. ISSNVolumeppc MIR Labs, www.mirlabs.net/jias/index.html Enhanced Sharing and Privacy in Collaborative

    Add to Reading List

    Source URL: www.infosys.tuwien.ac.at

    Language: English - Date: 2012-06-04 07:35:14
    7Computer security / Security / Access control / Computer access control / XACML / Binary decision diagram / PERMIS / Information flow / Role-based access control / Policy analysis / Security-Enhanced Linux / Model checking

    Verification and Change-Impact Analysis of Access-Control Policies∗ Kathi Fisler Shriram Krishnamurthi

    Add to Reading List

    Source URL: web.cs.wpi.edu

    Language: English - Date: 2005-04-29 09:42:28
    8Computer security / Computer access control / Access control / Role-based access control / Data security / NIST RBAC model / Role hierarchy / Petri net / PERMIS / XACML / Model-based testing / Reliability engineering

    IEEE TRANSACTIONS ON COMPUTERS, MANUSCRIPT ID 1 Automated Model-Based Testing of RoleBased Access Control Using Predicate/Transition Nets

    Add to Reading List

    Source URL: www.itrust.lu

    Language: English - Date: 2015-05-05 11:12:03
    9Access control / Security / Computer security / Computer access control / Role-based access control / File system / Lattice-based access control / Computer file / Access control list

     DISIͲViaSommarive14Ͳ38123PovoͲTrento(Italy) http://www.disi.unitn.it RELATION BASED ACCESS

    Add to Reading List

    Source URL: disi.unitn.it

    Language: English - Date: 2014-09-10 09:40:14
    UPDATE