×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [role hierarchies]
Home >
role hierarchies
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
4.966 views
INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
213 views
Gail-Joon Ahn and Ravi Sandhu George Mason University Myong Kang and Joon Park Naval Research Laboratory Injecting RBAC to Secure a Web-based Workflow.
217 views
© 2005 Ravi Sandhu Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology.
212 views
© 2005 Ravi Sandhu Role Usage and Activation Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security.
214 views
Enhancement of business it alignment by including responsibility components in rbac
44 views
Administrative Scope and Role-Based Administration Jason Crampton Information Security Group Royal Holloway, University of London.
219 views
CMSC 414 Computer and Network Security Lecture 12
35 views
Using the TBox to Optimise SPARQL Queries Birte Glimm Yevgeny Kazakov Ilianna Kollia and Giorgos Stamou CS 848 Paper Critique Vishnu Prathish.
213 views
Updating ABoxes in DL-Lite D. Calvanese, E. Kharlamov, W. Nutt, D. Zheleznyakov Free University of Bozen-Bolzano AMW 2010, May 2010.
214 views
Updating ABoxes in DL-Lite
45 views
Sales Force Team Force Platform & Cloud Computing Submitted to Professor Robert Zhu Course: Software Engineering (CS 532) Presented By Kancharla Sreeveni.
219 views
Next >