First Page | Document Content | |
---|---|---|
Date: 2008-02-07 14:26:30Computer network security Data security NIST RBAC model Role-based access control PERMIS Solid-state drive International Committee for Information Technology Standards Hierarchy Computer security Security Access control | Microsoft Word - BSR+INCITS+359.docAdd to Reading ListSource URL: profsandhu.comDownload Document from Source WebsiteFile Size: 356,31 KBShare Document on Facebook |
IEEE TRANSACTIONS ON COMPUTERS, MANUSCRIPT ID 1 Automated Model-Based Testing of RoleBased Access Control Using Predicate/Transition NetsDocID: 1q2nK - View Document | |
CON 2324 A Practical Guide to Role Engineering Shawn McKinney October 27, 2015 JavaOneDocID: 1pOUm - View Document | |
Tie-RBAC: An application of RBAC to Social Networks Antonio Tapiador, Diego Carrera, Joaquín Salvachúa Universidad Politécnica de Madrid Abstract This paper explores the application of role-based access control to socDocID: 1mbQ9 - View Document | |
Chapter 1 EDAC and ANSI INCITSRBAC ConformanceDocID: 18GHh - View Document | |
Microsoft Word - BSR+INCITS+359.docDocID: 13Vxs - View Document |