Back to Results
First PageMeta Content
Access control list / Filesystem permissions / Operating system / Capability-based security / File system / Unix / Kernel / Group identifier / Role-based access control / Security / Computer security / Access control


Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 4 Access Control
Add to Reading List

Document Date: 2006-12-30 11:29:19


Open Document

File Size: 859,58 KB

Share Result on Facebook

City

Cambridge / /

Company

IBM / Oracle / Win2K / Building Dependable Distributed Systems / NEEDHAM / Microsoft / /

Currency

USD / /

Facility

Building Dependable Distributed Systems Until / Building Dependable Distributed Systems As / /

IndustryTerm

security server / capability systems / online / time-sharing systems / public key protocol / authentication services / untrustworthy Web sites / branch accounting system / bank customer / communications ports / database product / crude solution / online authorization / Security systems / software packages / mainframe access control products / memory management hardware / database tools / server / write-once storage devices / bank / important applications / access control systems / words / banking / access control tools / external management infrastructure / built using database tools / /

OperatingSystem

Unix / AS/400 / Linux / FreeBSD / DOS / Windows 2000 / Microsoft Windows / Windows NT / /

Person

RICK MAYBURY / Bob / Alice / /

Position

assistant accountant / security manager / and chief foreign exchange dealer / system administrator / role acting manager / manager / teller / chief teller / chief teller / branch accountant / group manager / manager of the Cambridge branch / officer / branch manager / and so on / careless departmental administrator / supervisor / regional head / administrator / nurse / manager / deputy manager / and branch accountant / branch accountant / branch manager / /

Product

Kerberos / Win2K Kerberos / Windows 2000 / /

ProgrammingLanguage

R / C / /

Technology

Unix / Linux / Unix Operating System / operating system / SSL / operating systems / Access control list / cryptography / public key protocol / public key / database management system / /

SocialTag