×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [role hierarchies]
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
4.966 views
INSTITUTE FOR CYBER SECURITY April 20081 Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber
216 views
Gail-Joon Ahn and Ravi Sandhu George Mason University Myong Kang and Joon Park Naval Research Laboratory Injecting RBAC to Secure a Web-based Workflow
218 views
© 2005 Ravi Sandhu Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology
216 views
© 2005 Ravi Sandhu Role Usage and Activation Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security
218 views
Enhancement of business it alignment by including responsibility components in rbac
44 views
Administrative Scope and Role-Based Administration Jason Crampton Information Security Group Royal Holloway, University of London
221 views
CMSC 414 Computer and Network Security Lecture 12
36 views
Using the TBox to Optimise SPARQL Queries Birte Glimm Yevgeny Kazakov Ilianna Kollia and Giorgos Stamou CS 848 Paper Critique Vishnu Prathish
219 views
Updating ABoxes in DL-Lite D. Calvanese, E. Kharlamov, W. Nutt, D. Zheleznyakov Free University of Bozen-Bolzano AMW 2010, May 2010
217 views
Updating ABoxes in DL-Lite
49 views
Sales Force Team Force Platform & Cloud Computing Submitted to Professor Robert Zhu Course: Software Engineering (CS 532) Presented By Kancharla Sreeveni
220 views
Next >