Back to Results
First PageMeta Content
Process management / Role-based access control / Organisation-based access control / Role hierarchy / PERMIS / Theory of constraints / Process / Security / Access control / Computer security


An Approach to Engineer and Enforce Context Constraints in an RBAC Environment Gustaf Neumann Mark Strembeck
Add to Reading List

Document Date: 2015-02-14 09:46:19


Open Document

File Size: 201,24 KB

Share Result on Facebook

City

Como / Perm / /

Company

RBAC / /

Country

Italy / /

Currency

USD / /

/

Facility

New Media Lab Vienna University of Economics / /

IndustryTerm

real-world applications / groupware applications / workflow management / code applications / pervasive computing environment / access/travel history / ad hoc networking / authentication services / ubiquitous and pervasive computing context / software-based appliances / certain software tools / pervasive computing devices / software technologies / ubiquitous and pervasive computing / interactive networked applications / networked interactive applications / wireless communications / offered services / object access protocol / malicious mobile applications / Wireless LAN / location-based services / access control services / respective technologies / online examinations / exam-server / hardware technologies / /

Organization

e.g. / Department of Information Systems / University of Economics / BA / Assignment Unit Perm / /

/

Position

bond dealer / an executive officer / and a clerk / artist / Professor / Manager / General / Secretary / accounting clerk / controller / Engineer / /

ProgrammingLanguage

Tcl / XML / Java / XOTcl / C / /

Technology

object-oriented programming / cellular telephone / XML / Java / API / wireless communications / GPS / respective technologies / cell phones / CORBA / RDF / mobile device / software technologies / object access protocol / Operating Systems / Bluetooth / Wireless LAN / mobile devices / hardware technologies / /

SocialTag