<--- Back to Details
First PageDocument Content
Access control / Information security / National security / Role-based access control / Security controls / Password / Database security / Trusted Computer System Evaluation Criteria / Security / Computer security / Data security
Date: 2013-11-20 12:11:50
Access control
Information security
National security
Role-based access control
Security controls
Password
Database security
Trusted Computer System Evaluation Criteria
Security
Computer security
Data security

Control Family & Class

Add to Reading List

Source URL: www.cms.gov

Download Document from Source Website

File Size: 1,81 MB

Share Document on Facebook

Similar Documents

Data management / Computing / Data / Relational database management systems / Database theory / NoSQL / Structured storage / Database / NewSQL / Relational database / ODB / Conjunctive query

SoK: Cryptographically Protected Database Search Benjamin Fuller∗ , Mayank Varia† , Arkady Yerukhimovich‡ , Emily Shen‡ , Ariel Hamlin‡ , Vijay Gadepally‡ , Richard Shay‡ , John Darby Mitchell‡ , and Robe

DocID: 1xUwX - View Document

Terms of service / Software / Computing / Technology / Social networking services / Microblogging / Real-time web / Text messaging / Twitter / Privacy / Internet privacy / Medical privacy

Poster - Using Twitter to Identify Privacy Information Esha Sharma1 and Jessica Staddon 2 Abstract— We are building the first comprehensive database

DocID: 1xUpp - View Document

Morpheus Helps Meet Compliance & Security Demands provision with Morpheus automatically creates system, database, and application logs that allow you to analyze and troubleshoot in near real-time. Likewise, all the syste

DocID: 1uIVH - View Document

1.1 Advanced Security Consulting Service Description Your eTapestry database provides you with the opportunity to restrict certain areas of the database for access.

DocID: 1ufJI - View Document

The Gridiron Risk Model Aptible Gridiron uses a graph database to model information security risks, events or situations that have the potential to cause adverse impacts.

DocID: 1tIjT - View Document