<--- Back to Details
First PageDocument Content
Access control / Identity management / Authorization / Database / Role-based access control / ISO 10303 / Data model / Information security / Internet privacy / Security / Computing / Computer security
Date: 2013-07-02 20:28:16
Access control
Identity management
Authorization
Database
Role-based access control
ISO 10303
Data model
Information security
Internet privacy
Security
Computing
Computer security

Microsoft Word - v4-1-7.doc

Add to Reading List

Source URL: eprints.usq.edu.au

Download Document from Source Website

File Size: 415,02 KB

Share Document on Facebook

Similar Documents

NetAXS Web-based Access Control System Data Sheet

NetAXS Web-based Access Control System Data Sheet

DocID: 1xVj6 - View Document

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer  SIT, Email: philipp.holzinger@sit

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

DocID: 1xUqk - View Document

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

DocID: 1xUdf - View Document

Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas  Robert Bruce Findler

Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas Robert Bruce Findler

DocID: 1xU35 - View Document

Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

DocID: 1xTC8 - View Document