Separation of mechanism and policy

Results: 5



#Item
1Object-oriented programming / Access control / Identity management / X.509 / Object database / Separation of mechanism and policy / Security / Computing / Computer security

A Flexible Security System for Metacomputing Environments Adam Ferrari, Frederick Knabe, Marty Humphrey, Steve Chapin, and Andrew Grimshaw Department of Computer Science University of Virginia, Charlottesville, VA 22903,

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 1998-12-04 14:58:14
2Object-oriented programming / Access control / Identity management / X.509 / Object database / Separation of mechanism and policy / Security / Computing / Computer security

A Flexible Security System for Metacomputing Environments Adam Ferrari, Frederick Knabe, Marty Humphrey, Steve Chapin, and Andrew Grimshaw Department of Computer Science University of Virginia, Charlottesville, VA 22903,

Add to Reading List

Source URL: legion.virginia.edu

Language: English - Date: 1998-12-04 14:58:14
3Cyberwarfare / Crime prevention / National security / Data security / Information security / Security controls / Security service / Separation of mechanism and policy / Trusted Computer System Evaluation Criteria / Computer security / Computer network security / Security

Interdependency Analysis Richard K. McAllister Sparta Incorporated, Columbia MD[removed]ext[removed]removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
4Identity management / Role-based access control / Access Control Matrix / Separation of mechanism and policy / S10 / Security policy / Security / Computer security / Access control

The Computational Complexity of Enforceability Validation for Generic Access Control Rules Vincent C. Hu, D. Richard Kuhn, and David F. Ferraiolo National Institute of Standards and Technology, Gaithersburg, Maryland 208

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-26 01:00:00
5Access Control Matrix / Discretionary access control / HRU / Role-based access control / Authorization / Separation of mechanism and policy / Multilevel security / Kernel / Mandatory access control / Computer security / Security / Access control

Access Control: Policies, Models, and Mechanisms Pierangela Samarati1 and Sabrina De Capitani di Vimercati2 1

Add to Reading List

Source URL: spdp.di.unimi.it

Language: English - Date: 2012-12-10 09:50:04
UPDATE