Role hierarchy

Results: 59



#Item
21Microsoft Word - SampleChapter.doc

Microsoft Word - SampleChapter.doc

Add to Reading List

Source URL: www.killerphp.com

Language: English - Date: 2008-10-16 13:26:08
22Information Leaflet 7: The Hierarchy of Planning Documents and their Role in Making a Planning Decision

Information Leaflet 7: The Hierarchy of Planning Documents and their Role in Making a Planning Decision

Add to Reading List

Source URL: www.planningni.gov.uk

Language: English - Date: 2008-01-14 08:34:23
23DRAFT[removed]BSR INCITS 359  American National Standard

DRAFT[removed]BSR INCITS 359 American National Standard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-05-05 01:00:00
24Expressing User Access Authorization Exceptions in Conventional Role-based Access Control Xiaofan Liu1,2 , Natasha Alechina1 , and Brian Logan1 1 2

Expressing User Access Authorization Exceptions in Conventional Role-based Access Control Xiaofan Liu1,2 , Natasha Alechina1 , and Brian Logan1 1 2

Add to Reading List

Source URL: www.cs.nott.ac.uk

Language: English - Date: 2014-09-26 16:58:51
25Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems

Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 12:37:28
26A role-based access control model and reference implementation within a corporate intranet

A role-based access control model and reference implementation within a corporate intranet

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 12:22:16
27Push Architectures for User Role Assignment Venkata Bhamidipati and Ravi Sandhu Laboratory for Information Security Technology Information and Software Engineering Department George Mason University fvbhamidi, sandhug@gm

Push Architectures for User Role Assignment Venkata Bhamidipati and Ravi Sandhu Laboratory for Information Security Technology Information and Software Engineering Department George Mason University fvbhamidi, sandhug@gm

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
28Generalized Role-Based Access Control for Securing Future Applications Michael J. Covingtony Matthew J. Moyer

Generalized Role-Based Access Control for Securing Future Applications Michael J. Covingtony Matthew J. Moyer

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
29Advanced Features for Enterprise-Wide Role-Based Access Control Axel Kern Systor Security Solutions GmbH Hermann-Heinrich-Gossen-Str[removed]K¨oln, Germany [removed]

Advanced Features for Enterprise-Wide Role-Based Access Control Axel Kern Systor Security Solutions GmbH Hermann-Heinrich-Gossen-Str[removed]K¨oln, Germany [removed]

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2002-12-09 11:36:37
30DRAFT[removed]BSR INCITS 359  American National Standard

DRAFT[removed]BSR INCITS 359 American National Standard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2003-04-08 01:00:00