First Page | Document Content | |
---|---|---|
![]() Date: 2014-07-02 10:19:30Access control Role-based access control Computer network security Mandatory access control Authorization Information security management system Information security NIST RBAC model Computer security Security Data security | Add to Reading List |
![]() | IEEE TRANSACTIONS ON COMPUTERS, MANUSCRIPT ID 1 Automated Model-Based Testing of RoleBased Access Control Using Predicate/Transition NetsDocID: 1q2nK - View Document |
![]() | CON 2324 A Practical Guide to Role Engineering Shawn McKinney October 27, 2015 JavaOneDocID: 1pOUm - View Document |
![]() | Tie-RBAC: An application of RBAC to Social Networks Antonio Tapiador, Diego Carrera, Joaquín Salvachúa Universidad Politécnica de Madrid Abstract This paper explores the application of role-based access control to socDocID: 1mbQ9 - View Document |
![]() | Chapter 1 EDAC and ANSI INCITSRBAC ConformanceDocID: 18GHh - View Document |
![]() | Microsoft Word - BSR+INCITS+359.docDocID: 13Vxs - View Document |