Mandatory access control

Results: 211



#Item
121Role-based access control / Role hierarchy / Organisation-based access control / PERMIS / Discretionary access control / Filesystem permissions / Mandatory access control / Computer security / Security / Access control

Conflict Checking of Separation of Duty Constraints in RBAC Implementation Experiences Mark Strembeck Department of Information Systems, New Media Lab Vienna University of Economics and BA, Austria mark.strembeck@wu-wien

Add to Reading List

Source URL: wi.wu-wien.ac.at

Language: English - Date: 2003-12-12 09:40:31
122Role-based access control / XACML / Mandatory access control / Discretionary access control / Authorization / PERMIS / Computer security / Security / Access control

A Meta Model for Access Control: Why is it needed and is it even possible to achieve?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:58:32
123Role-based access control / Identity management / Role hierarchy / Discretionary access control / Mandatory access control / Lattice-based access control / AGDLP / Delegation in IT / Computer security / Security / Access control

OBSERVATIONS ON THE REAL-WORLD IMPLEMENTATION OF ROLE-BASED ACCESS CONTROL Burkhard Hilchenbach Schumann Security Software, Inc. 314 Marshall Road

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
124Discretionary access control / Mandatory access control / Access Control Matrix / Role-based access control / Capability-based security / Authorization / Type enforcement / Bell–LaPadula model / Computer security / Security / Access control

NISTIR xxxx, Policy Machine: Features, Architecture, and Specification

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:38:25
125Cloud storage / Data management / Database / Database theory / Data center / Cloud computing / Mandatory access control / XAM / Computing / Concurrent computing / Distributed computing

Secu rit y Enabling an EnterpriseWide, Data-Centric Operating Environment David Ferraiolo and Serban Gavrila,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-18 09:59:52
126Data security / Crime prevention / National security / Role-based access control / Separation of duties / Information security / Role hierarchy / Mandatory access control / PERMIS / Security / Computer security / Access control

Master Thesis Computer Science Thesis no: MCS-2006:16 January[removed]Separation of Duty in Role Based Access

Add to Reading List

Source URL: www.bth.se

Language: English - Date: 2009-06-25 11:14:02
127Identity management / Discrimination / Role-based access control / Information security / Federal Information Security Management Act / Regulatory compliance / Mandatory access control / XACML / Vulnerability / Security / Computer security / Access control

Vision Statement for the Privilege Management Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-07-28 01:00:00
128Role-based access control / NIST RBAC model / Role hierarchy / PERMIS / Discretionary access control / Mandatory access control / Delegation in IT / AGDLP / Computer security / Security / Access control

Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, [removed]

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-04-05 18:45:38
129Role-based access control / Role hierarchy / PERMIS / Filesystem permissions / Mandatory access control / Delegation in IT / AGDLP / Computer security / Security / Access control

IEEE Computer, Volume 29, Number 2, February 1996, pages[removed]Role-Based Access Control Modelsyz Ravi S. Sandhu , Edward J. Coyne , Hal L. Feinstein and Charles E. Youman {

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-10-10 01:00:00
130Monolithic kernels / Kernel / Ring / Mandatory access control / Architecture of Windows NT / Operating system / Mach / Trusted computing base / Linux kernel / Computer architecture / System software / Software

Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2008-10-09 13:10:59
UPDATE