<--- Back to Details
First PageDocument Content
Access control / Role-based access control / Computer network security / Mandatory access control / Authorization / Information security management system / Information security / NIST RBAC model / Computer security / Security / Data security
Date: 2014-07-02 10:19:30
Access control
Role-based access control
Computer network security
Mandatory access control
Authorization
Information security management system
Information security
NIST RBAC model
Computer security
Security
Data security

NISTIR 7987, Policy Machine: Features, Architecture, and Specification

Add to Reading List

Source URL: nvlpubs.nist.gov

Download Document from Source Website

File Size: 1,74 MB

Share Document on Facebook

Similar Documents

Computer security / Computer access control / Access control / Role-based access control / Data security / NIST RBAC model / Role hierarchy / Petri net / PERMIS / XACML / Model-based testing / Reliability engineering

IEEE TRANSACTIONS ON COMPUTERS, MANUSCRIPT ID 1 Automated Model-Based Testing of RoleBased Access Control Using Predicate/Transition Nets

DocID: 1q2nK - View Document

Computer security / Security / Access control / Computer access control / Role-based access control / Identity management / PERMIS / JavaOne / NIST RBAC model

CON 2324 A Practical Guide to Role Engineering Shawn McKinney October 27, 2015 JavaOne

DocID: 1pOUm - View Document

Computer security / Security / Access control / Computer access control / Role-based access control / PERMIS / Mandatory access control / Social networking service / Interpersonal ties / Social network / NIST RBAC model

Tie-RBAC: An application of RBAC to Social Networks Antonio Tapiador, Diego Carrera, Joaquín Salvachúa Universidad Politécnica de Madrid Abstract This paper explores the application of role-based access control to soc

DocID: 1mbQ9 - View Document

Role-based access control / PERMIS / International Committee for Information Technology Standards / NIST RBAC model / Security / Access control / Computer security

Chapter 1 EDAC and ANSI INCITSRBAC Conformance

DocID: 18GHh - View Document

Computer network security / Data security / NIST RBAC model / Role-based access control / PERMIS / Solid-state drive / International Committee for Information Technology Standards / Hierarchy / Computer security / Security / Access control

Microsoft Word - BSR+INCITS+359.doc

DocID: 13Vxs - View Document