![Identity management / Role-based access control / Unix / Role hierarchy / PERMIS / Theta role / Group / Function / Filesystem permissions / Security / Access control / Computer security Identity management / Role-based access control / Unix / Role hierarchy / PERMIS / Theta role / Group / Function / Filesystem permissions / Security / Access control / Computer security](https://www.pdfsearch.io/img/d360539847f008b384bce0ae3cea72ae.jpg)
| Document Date: 2007-09-19 01:00:00 Open Document File Size: 34,81 KBShare Result on Facebook
Company Security Systems / Elsevier Science B.V. / / Country United States / / / Facility INHERITANCE PROPERTIES OF ROLE HIERARCHIES W.A. Jansen National Institute of Standards and Technology Gaithersburg / / IndustryTerm present day information systems / / Organization Static Separation of Duty / Institute of Standards and Technology Gaithersburg / / Person Mary Ellen Zurko / Richard T. Simon / Ravi S. Sandhu / David Ferraiolo / / Position model / and also the strongest / administrator / / ProvinceOrState Maryland / / Technology DSD / operating system / operating systems / database management system / /
SocialTag |