Back to Results
First PageMeta Content
Identity management / Role-based access control / Access Control Matrix / Separation of mechanism and policy / S10 / Security policy / Security / Computer security / Access control


The Computational Complexity of Enforceability Validation for Generic Access Control Rules Vincent C. Hu, D. Richard Kuhn, and David F. Ferraiolo National Institute of Standards and Technology, Gaithersburg, Maryland 208
Add to Reading List

Document Date: 2007-10-26 01:00:00


Open Document

File Size: 140,24 KB

Share Result on Facebook

City

San Francisco / Phoenix / Tucson / Bedford / Oakland / New York / /

Company

IEEE Comp Soc Press / Clark D. D. / Cook S. A. / IEEE Computer Society Press / Computer Science Press INC / W.H. FREEMAN AND COMPANY / Applied Computer Security Associates / Heterogeneous Information Systems / Secure Computer Systems / MITRE Corp. / /

/

Facility

David F. Ferraiolo National Institute of Standards and Technology / terminal sx. / University of Idaho / /

IndustryTerm

access control mechanism/algorithm / distributed computing environments / access control systems / elegant solutions / access control algorithm / elementary algorithm / /

Movie

Conflict Of Interest / /

Organization

National Institute of Standards and Technology / University of Idaho / Computer Science Department / Association for Computing Machinery / /

Person

Vincent C. Hu / David F. Ferraiolo / D. Richard Kuhn / /

/

ProvinceOrState

New York / California / Arizona / Massachusetts / Idaho / /

PublishedMedium

Communications of the ACM / Theory of Computing / /

Technology

access control algorithm / Control algorithm / elementary algorithm / Operating Systems / access control mechanism/algorithm / Access Control List / /

URL

http /

SocialTag