Role hierarchy

Results: 59



#Item
31The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-01-23 12:29:04
32SACMAT 2001: 6th ACM Symposium on Access Control Models and Technologies, Chantilly, VA, USA, ACM.  The Role-Based Access Control System of a European Bank: A Case Study and Discussion Andreas Schaad

SACMAT 2001: 6th ACM Symposium on Access Control Models and Technologies, Chantilly, VA, USA, ACM. The Role-Based Access Control System of a European Bank: A Case Study and Discussion Andreas Schaad

Add to Reading List

Source URL: moffett.me.uk

Language: English - Date: 2006-04-24 07:57:07
333  XACML Profile for Role Based Access Control (RBAC)  4

3 XACML Profile for Role Based Access Control (RBAC) 4

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-04-05 16:10:01
34Library Trends: The Role of Classification in Knowledge Repre...  http://findarticles.com/p/articles/mi_m1387/is_1_48/ai_570465... FindArticles > Library Trends > Summer, 1999 > Article > Print friendly

Library Trends: The Role of Classification in Knowledge Repre... http://findarticles.com/p/articles/mi_m1387/is_1_48/ai_570465... FindArticles > Library Trends > Summer, 1999 > Article > Print friendly

Add to Reading List

Source URL: polaris.gseis.ucla.edu

Language: English - Date: 2008-09-30 02:53:09
35Conflict Checking of Separation of Duty Constraints in RBAC Implementation Experiences Mark Strembeck Department of Information Systems, New Media Lab Vienna University of Economics and BA, Austria mark.strembeck@wu-wien

Conflict Checking of Separation of Duty Constraints in RBAC Implementation Experiences Mark Strembeck Department of Information Systems, New Media Lab Vienna University of Economics and BA, Austria mark.strembeck@wu-wien

Add to Reading List

Source URL: wi.wu-wien.ac.at

Language: English - Date: 2003-12-12 09:40:31
36A Framework for Modeling Privacy Requirements in Role Engineering Qingfeng He and Annie I. Antόn Department of Computer Science North Carolina State University Raleigh, NC[removed], USA {qhe2, aianton}@eos.ncsu.edu

A Framework for Modeling Privacy Requirements in Role Engineering Qingfeng He and Annie I. Antόn Department of Computer Science North Carolina State University Raleigh, NC[removed], USA {qhe2, aianton}@eos.ncsu.edu

Add to Reading List

Source URL: crinfo.univ-paris1.fr

Language: English - Date: 2003-05-15 04:24:41
373  XACML Profile for Role Based Access Control (RBAC)  4

3 XACML Profile for Role Based Access Control (RBAC) 4

Add to Reading List

Source URL: docs.oasis-open.org

Language: English - Date: 2004-07-19 15:32:40
38OBSERVATIONS ON THE REAL-WORLD IMPLEMENTATION OF ROLE-BASED ACCESS CONTROL Burkhard Hilchenbach Schumann Security Software, Inc. 314 Marshall Road

OBSERVATIONS ON THE REAL-WORLD IMPLEMENTATION OF ROLE-BASED ACCESS CONTROL Burkhard Hilchenbach Schumann Security Software, Inc. 314 Marshall Road

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
39Microsoft Word - Healthcare RBAC TF Role Engineering Process v3.0.doc

Microsoft Word - Healthcare RBAC TF Role Engineering Process v3.0.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-31 15:50:04
40S-57 Appendix A Chapter 2 - Attributes Edition 3.1  Attributes

S-57 Appendix A Chapter 2 - Attributes Edition 3.1 Attributes

Add to Reading List

Source URL: www.iho-ohi.net

Language: English - Date: 2009-09-05 05:01:36