<--- Back to Details
First PageDocument Content
Discretionary access control / Mandatory access control / Access Control Matrix / Role-based access control / Capability-based security / Authorization / Type enforcement / Bell–LaPadula model / Computer security / Security / Access control
Date: 2013-01-23 12:38:25
Discretionary access control
Mandatory access control
Access Control Matrix
Role-based access control
Capability-based security
Authorization
Type enforcement
Bell–LaPadula model
Computer security
Security
Access control

NISTIR xxxx, Policy Machine: Features, Architecture, and Specification

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 1,84 MB

Share Document on Facebook

Similar Documents

Chapter 2: Access Control Matrix • Overview • Access Control Matrix Model • Protection State Transitions – Commands – Conditional Commands

DocID: 1uUgf - View Document

Computer security / Computer access control / Software / Computing / Access control / Memory management / Memory protection / Kernel / Capability-based security / Operating system / Access Control Matrix / File system

Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract

DocID: 1r6Eg - View Document

Software / Computer access control / Password / Security / Prevention / ANI / Cursor / Icon / Point and click / Draw a Secret / Pointer

A Random Cursor Matrix to Hide Graphical Password Input Alice Boit Thomas Geimer Hochschule Bremen (University of Applied Sciences) J¨orn Loviscach∗

DocID: 1qMRC - View Document

Computer security / Security / Computer access control / Access control / Identity management / Role-based access control / Access control list / Access Control Matrix / Group / PERMIS / Attribute-Based Access Control

UNIVERSITY OF TRENTO DIPARTIMENTO DI INGEGNERIA E SCIENZA DELL’INFORMAZIONEPovo – Trento (Italy), Via Sommarive 14 http://www.disi.unitn.it

DocID: 1quID - View Document

Algebra / Mathematics / Linear algebra / Matrix theory / Abstract algebra / Eigenvalues and eigenvectors / Singular value decomposition / Markov chain

Performance of Random Medium Access Control An asymptotic approach Charles Bordenave David McDonald

DocID: 1qrZE - View Document