First Page | Document Content | |
---|---|---|
![]() Date: 2012-05-15 09:51:53Role-based access control XACML Discretionary access control PERMIS Information security Authorization Security management Capability-based security Federal Information Security Management Act Security Computer security Access control | Add to Reading List |
![]() | Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TTDocID: 1voGj - View Document |
![]() | Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TTDocID: 1tYAK - View Document |
![]() | 2 SAML 2.0 profile of XACML v2.0 3DocID: 1sUul - View Document |
![]() | Draft NISTIR 8112, Attribute MetadataDocID: 1rtQZ - View Document |
![]() | Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins RoaDocID: 1rtqe - View Document |