Discretionary access control

Results: 58



#Item
31Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992), Baltimore MD pp[removed]David F. Ferraiolo and D. Richard Kuhn National Institute of Standards and Technology

Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992), Baltimore MD pp[removed]David F. Ferraiolo and D. Richard Kuhn National Institute of Standards and Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-04-28 01:00:00
32The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:29:04
33Conflict Checking of Separation of Duty Constraints in RBAC Implementation Experiences Mark Strembeck Department of Information Systems, New Media Lab Vienna University of Economics and BA, Austria mark.strembeck@wu-wien

Conflict Checking of Separation of Duty Constraints in RBAC Implementation Experiences Mark Strembeck Department of Information Systems, New Media Lab Vienna University of Economics and BA, Austria mark.strembeck@wu-wien

Add to Reading List

Source URL: wi.wu-wien.ac.at

Language: English - Date: 2003-12-12 09:40:31
34A Meta Model for Access Control: Why is it needed and is it even possible to achieve?

A Meta Model for Access Control: Why is it needed and is it even possible to achieve?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:58:32
35OBSERVATIONS ON THE REAL-WORLD IMPLEMENTATION OF ROLE-BASED ACCESS CONTROL Burkhard Hilchenbach Schumann Security Software, Inc. 314 Marshall Road

OBSERVATIONS ON THE REAL-WORLD IMPLEMENTATION OF ROLE-BASED ACCESS CONTROL Burkhard Hilchenbach Schumann Security Software, Inc. 314 Marshall Road

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
36NISTIR xxxx, Policy Machine: Features, Architecture, and Specification

NISTIR xxxx, Policy Machine: Features, Architecture, and Specification

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:38:25
37Proceedings Template - WORD

Proceedings Template - WORD

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:22:00
38Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, [removed]

Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, [removed]

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-04-05 18:45:38
39CHI 2008 Proceedings · Policy, Telemedicine, and Enterprise  April 5-10, 2008 · Florence, Italy A User Study of Policy Creation in a Flexible Access-Control System

CHI 2008 Proceedings · Policy, Telemedicine, and Enterprise April 5-10, 2008 · Florence, Italy A User Study of Policy Creation in a Flexible Access-Control System

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 08:58:11
40Composing and Combining Policies under the Policy Machine David F. Ferraiolo, Serban Gavrila*, Vincent Hu, D. Richard Kuhn National Institute of Standards and Technology Gaithersburg, MD 20899 +[removed]

Composing and Combining Policies under the Policy Machine David F. Ferraiolo, Serban Gavrila*, Vincent Hu, D. Richard Kuhn National Institute of Standards and Technology Gaithersburg, MD 20899 +[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-26 01:00:00