Access control list

Results: 137



#Item
11Government / Students for Sensible Drug Policy / Drug Policy Alliance / Prohibition of drugs / Beckley Foundation / Transform Drug Policy Foundation / New Zealand Drug Foundation / Illegal drug trade / Drug control law / Drug policy / Law

List of New York NGO Committee Members – June 2015 Organization A Better Way Foundation (ABWF) AIDS Service Center (ASCNYC) Al-Maqdese for Society Development (MSD) Americans For Safe Access (ASA)

Add to Reading List

Source URL: nyngoc.org

Language: English - Date: 2015-05-29 14:23:01
12Access control list / Filesystem permissions / Operating system / Capability-based security / File system / Unix / Kernel / Group identifier / Role-based access control / Security / Computer security / Access control

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-12-30 11:29:19
13Access control / System administration / Access control list / Filesystem permissions / Mandatory access control / Operating system / File system / Role-based access control / Computer file / System software / Computing / Computer security

CHAPTER 4 Access Control Going all the way back to early time-sharing systems we systems

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:23:17
14Ethics / Law enforcement in the United States / Advocacy groups / Medical ethics / Students for Sensible Drug Policy / Drug Policy Alliance / Prohibition of drugs / Beckley Foundation / Transform Drug Policy Foundation / Drug control law / Drug policy / Law

List of New York NGO Committee Members – April 2015 Organization A Better Way Foundation (ABWF) AIDS Service Center (ASCNYC) Al-Maqdese for Society Development (MSD) Americans For Safe Access (ASA)

Add to Reading List

Source URL: nyngoc.org

Language: English - Date: 2015-04-21 16:58:39
15Pennsylvania / Duty-free shop / Pepper spray / Hand luggage / Orlando International Airport / Philadelphia International Airport / Cochin International Airport / Security / Access control / Airport security

Last revised: Prohibited Articles During Air Travel The list of prohibited articles below is based on • Commission Regulation (EU) Noof 4 March 2010 laying down detailed measures for the implement

Add to Reading List

Source URL: www.berlin-airport.de

Language: English - Date: 2014-06-19 19:31:18
16Capability-based security / Object-capability model / Access control list / EROS / Confused deputy problem / Ambient authority / Access Control Matrix / C-list / Infrastructure optimization / Security / Computer security / Access control

Capability Myths Demolished Mark S. Miller Combex, Inc.

Add to Reading List

Source URL: www.erights.org

Language: English - Date: 2005-10-31 18:00:51
17Access control list / Conj / Man-in-the-middle attack / Public-key cryptography / Mathematical proof / Communications protocol / Data / Information / Mathematics

Confidentiality-Preserving Distributed Proofs of Conjunctive Queries Adam J. Lee† Kazuhiro Minami‡

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:19
18Access control / Access control list / Unix / Filesystem permissions / Mandatory access control / Role-based access control / Grsecurity / Access Control Matrix / Type enforcement / Computer security / Security / System software

SELinux and grsecurity: A Side-by-Side Comparison of Mandatory Access Control and Access Control List Implementations Michael Fox, John Giordano, Lori Stotler, Arun Thomas {mrf4u, jcg8f, les7j, at4a}@cs.virginia.edu

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2005-08-24 18:01:33
19Windows Server / Windows Vista / Attack Surface Analyzer / Computer security / Access control list / Windows Registry / Mandatory Integrity Control / Filesystem permissions / Architecture of Windows NT / Microsoft Windows / Computing / System software

Attack Surface Analyzer Readme In This Document Overview System Requirements Instructions Collecting attack surface information with .NET Framework 4 installed

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2012-08-01 20:48:11
20IP address / ACCESS / Standard Access Control List

Device Admin: Specific User Command Detail - TACACS+ Chronological list of cmds issued by a specific user. Cmds Issued By Specific User Betweenandabaker (Group 2)

Add to Reading List

Source URL: www.extraxi.com

Language: English - Date: 2005-05-05 03:34:36
UPDATE