Mandatory access control

Results: 211



#Item
141Notary / Packaging / Email / Technology / Internet / Security / Access control / Authentication

Companies House Electronic Filing Service Presenter Account Application (To File Non-fee Bearing Documents Only) Please note: Some fields are Mandatory. The form will be returned if these fields are not completed. Please

Add to Reading List

Source URL: companieshouse.gov.uk

Language: English - Date: 2013-11-11 02:42:35
142Computer security / Identity management / Card reader / Credit card / Security / Smart cards / Access control

Policy Name: Originating/Responsible Department: Approval Authority: Date of Original Policy: Last Updated: Mandatory Revision Date:

Add to Reading List

Source URL: carleton.ca

Language: English - Date: 2014-01-17 08:43:12
143Computer security / Crime prevention / National security / Agricultural Marketing Service / Access control / Mandatory price reporting / Application software / Security / United States Department of Agriculture / Information technology audit

Microsoft Word[removed]FINAL_WITHOUT links-version resent to FOIA[removed]…

Add to Reading List

Source URL: www.usda.gov

Language: English - Date: 2005-03-14 09:27:59
144Mandatory access control / Model checking / Role-based access control / Computation tree logic / PERMIS / Security / Computer security / Access control

May 27, [removed]:33 WSPC/117-IJSEKE S021819401100513X -

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-03 09:41:10
145Science / Cataloging / Library of Congress / Library of Congress Control Number / Library classification / Uniform title / International Standard Serial Number / Library science / Information / Identifiers

Appendix B “Access Level” MARC/ACCR Catalog Record Mandatory Data Elements M = Mandatory A = Mandatory if applicable

Add to Reading List

Source URL: www.loc.gov

Language: English - Date: 2005-03-23 07:53:29
146National security / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Mandatory access control / Trusted computing base / Clark–Wilson model / Ring / Capability-based security / Computer security / Security / Crime prevention

DOCID: ·[removed]A Stab at A2 Criteria (b)(3)-P.L[removed]and

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2012-01-04 11:57:17
147Access control / Role-based access control / Computer network security / Mandatory access control / Authorization / Information security management system / Information security / NIST RBAC model / Computer security / Security / Data security

NISTIR 7987, Policy Machine: Features, Architecture, and Specification

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-07-02 10:19:30
148Role-based access control / Mandatory access control / Discretionary access control / Authentication / XACML / Security / Computer security / Access control

ITL Security Bulletin, Attribute Based Access Conctrol (ABAC) Definition and Considerations, (March 2014)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-03-07 11:05:57
149XACML / Role-based access control / Authorization / Mandatory access control / Discretionary access control / PERMIS / Computer security / Security / Access control

Enterprise Policy Management with Semantic Technologies Evren Sirin, CTO Clark & Parsia, LLC [removed]

Add to Reading List

Source URL: static59.mediabistro.com

Language: English - Date: 2011-11-18 15:23:10
150Notary / Packaging / Email / Technology / Internet / Security / Access control / Authentication

Companies House Electronic Filing Service Presenter Account Application (To File Non-fee Bearing Documents Only) Please note: Some fields are Mandatory. The form will be returned if these fields are not completed. Please

Add to Reading List

Source URL: www.companieshouse.gov.uk

Language: English - Date: 2013-11-11 02:42:35
UPDATE