Delegation in IT

Results: 51



#Item
31Role-based access control / Identity management / Role hierarchy / Discretionary access control / Mandatory access control / Lattice-based access control / AGDLP / Delegation in IT / Computer security / Security / Access control

OBSERVATIONS ON THE REAL-WORLD IMPLEMENTATION OF ROLE-BASED ACCESS CONTROL Burkhard Hilchenbach Schumann Security Software, Inc. 314 Marshall Road

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
32Role-based access control / Role hierarchy / PERMIS / XACML / Delegation in IT / AGDLP / Security / Access control / Computer security

Microsoft Word - Healthcare RBAC TF Role Engineering Process v3.0.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-31 15:50:04
33Role-based access control / Role hierarchy / PERMIS / NIST RBAC model / Delegation in IT / AGDLP / Computer security / Security / Access control

DRAFT[removed]BSR INCITS 359 American National Standard

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-04-03 20:24:29
34Administrative law / Contract law / Delegation / Medicine / Unlicensed assistive personnel / Team nursing / Delegation in IT / Health / Nursing / Law

Delegation & Assignment Montana State Board of Nursing Tutorial on Subchapter 16 Updated 2011

Add to Reading List

Source URL: www.bsd.dli.mt.gov

Language: English - Date: 2013-04-23 13:11:18
35Role-based access control / NIST RBAC model / Role hierarchy / PERMIS / Discretionary access control / Mandatory access control / Delegation in IT / AGDLP / Computer security / Security / Access control

Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, [removed]

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-04-05 18:45:38
36Role-based access control / Role hierarchy / PERMIS / Filesystem permissions / Mandatory access control / Delegation in IT / AGDLP / Computer security / Security / Access control

IEEE Computer, Volume 29, Number 2, February 1996, pages[removed]Role-Based Access Control Modelsyz Ravi S. Sandhu , Edward J. Coyne , Hal L. Feinstein and Charles E. Youman {

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-10 01:00:00
37Administrative law / Contract law / Delegation / Law / Healthcare / Unlicensed assistive personnel / Health care provider / Delegation in IT / Health / Medicine / Nursing

CERTIFIED NURSING ASSISTANT UTAH NURSING ASSISTANT REGISTRY SCOPE OF RESPONSIBILITIES A nursing assistant may provide care in many health care areas while under the supervision of a licensed nurse.

Add to Reading List

Source URL: www.utahcna.com

Language: English - Date: 2012-10-22 10:48:13
38

U.S. Business Exhibition May 2012 in Turkmenistan REGISTRATION FORM Please fill out the registration form below for each member of your delegation and email it as an MS Word document along with a color PDF file of the b

Add to Reading List

Source URL: photos.state.gov

- Date: 2014-09-09 08:37:43
    39User / System administrator / Identity management / Computer security / Delegation in IT / Computing / Password policy / Password

    NCID Integration Phase 2 1 (Planning) (Customer Initiation) Web Service Call Detail NCID Terminology Term

    Add to Reading List

    Source URL: www.ncid.its.state.nc.us

    Language: English - Date: 2011-04-28 14:45:57
    40Nursing credentials and certifications / Unlicensed assistive personnel / Delegation / Licensed practical nurse / Registered nurse / Delegation in IT / Health / Nursing / Medicine

    Guidelines for Registered Nurse Delegation to Unlicensed Assistive Personnel © Wisconsin Nurses Association 6117 Monona Drive, Suite 1

    Add to Reading List

    Source URL: www.wisconsinnurses.com

    Language: English - Date: 2008-10-15 18:24:00
    UPDATE