21![Microsoft Word - SampleChapter.doc Microsoft Word - SampleChapter.doc](https://www.pdfsearch.io/img/921fc90015447a064aff3f9427949b7e.jpg) | Add to Reading ListSource URL: www.killerphp.comLanguage: English - Date: 2008-10-16 13:26:08
|
---|
22![Information Leaflet 7: The Hierarchy of Planning Documents and their Role in Making a Planning Decision Information Leaflet 7: The Hierarchy of Planning Documents and their Role in Making a Planning Decision](https://www.pdfsearch.io/img/637758f8c529c6db797c29a536f375b5.jpg) | Add to Reading ListSource URL: www.planningni.gov.ukLanguage: English - Date: 2008-01-14 08:34:23
|
---|
23![DRAFT[removed]BSR INCITS 359 American National Standard DRAFT[removed]BSR INCITS 359 American National Standard](https://www.pdfsearch.io/img/a0d30eb5f6558d93ba01d24d18d86da3.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2009-05-05 01:00:00
|
---|
24![Expressing User Access Authorization Exceptions in Conventional Role-based Access Control Xiaofan Liu1,2 , Natasha Alechina1 , and Brian Logan1 1 2 Expressing User Access Authorization Exceptions in Conventional Role-based Access Control Xiaofan Liu1,2 , Natasha Alechina1 , and Brian Logan1 1 2](https://www.pdfsearch.io/img/3a27a704702d1777e1fa5be0af584e0d.jpg) | Add to Reading ListSource URL: www.cs.nott.ac.ukLanguage: English - Date: 2014-09-26 16:58:51
|
---|
25![Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems](https://www.pdfsearch.io/img/619c8f2533adc3f5e1f28a04d189b4fc.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2014-12-23 12:37:28
|
---|
26![A role-based access control model and reference implementation within a corporate intranet A role-based access control model and reference implementation within a corporate intranet](https://www.pdfsearch.io/img/af53669674bf04b6f587100976c731fa.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2014-12-23 12:22:16
|
---|
27![Push Architectures for User Role Assignment Venkata Bhamidipati and Ravi Sandhu Laboratory for Information Security Technology Information and Software Engineering Department George Mason University fvbhamidi, sandhug@gm Push Architectures for User Role Assignment Venkata Bhamidipati and Ravi Sandhu Laboratory for Information Security Technology Information and Software Engineering Department George Mason University fvbhamidi, sandhug@gm](https://www.pdfsearch.io/img/3aa472d3ab494e210647f354cf1200d9.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2000-11-03 00:00:00
|
---|
28![Generalized Role-Based Access Control for Securing Future Applications Michael J. Covingtony Matthew J. Moyer Generalized Role-Based Access Control for Securing Future Applications Michael J. Covingtony Matthew J. Moyer](https://www.pdfsearch.io/img/9d555df3245df0ffd0047e7efc32bfdd.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2000-11-03 00:00:00
|
---|
29![Advanced Features for Enterprise-Wide Role-Based Access Control Axel Kern Systor Security Solutions GmbH Hermann-Heinrich-Gossen-Str[removed]K¨oln, Germany [removed] Advanced Features for Enterprise-Wide Role-Based Access Control Axel Kern Systor Security Solutions GmbH Hermann-Heinrich-Gossen-Str[removed]K¨oln, Germany [removed]](https://www.pdfsearch.io/img/0e526a18e7d7536d75209d3dedb40e85.jpg) | Add to Reading ListSource URL: www.acsac.orgLanguage: English - Date: 2002-12-09 11:36:37
|
---|
30![DRAFT[removed]BSR INCITS 359 American National Standard DRAFT[removed]BSR INCITS 359 American National Standard](https://www.pdfsearch.io/img/83b05dedb138cc96b7d561e257963091.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2003-04-08 01:00:00
|
---|