Results 121 to 130 of about 5,194,532 (200)

On the Interaction Between Role-Based Access Control and Relational Databases

open access: bronze, 1997
Sylvia L. Osborn   +2 more
openalex   +1 more source

DePLOI: Applying NL2SQL to Synthesize and Audit Database Access Control [PDF]

open access: yesarXiv
In every enterprise database, administrators must define an access control policy that specifies which users have access to which tables. Access control straddles two worlds: policy (organization-level principles that define who should have access) and process (database-level primitives that actually implement the policy).
arxiv  

A Spatio-temporal Role-Based Access Control Model [PDF]

open access: bronze, 2007
Indrakshi Ray, Manachai Toahchoodee
openalex   +1 more source

Use of Role Based Access Control for Security-Purpose Hypervisors [PDF]

open access: yes, 2013
Chadwick, David W   +2 more
core   +1 more source

Enforcing Role-Based Access Control Policies in Web Services with UML and OCL [PDF]

open access: green, 2008
Karsten Sohr   +3 more
openalex   +1 more source

Comparative analysis of identity management, access control, and authorization practices in public and private universities [version 2; peer review: 2 approved]

open access: yesOpen Research Europe
Background This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities.
Vesna Dimitrova, Elissa Mollakuqe
doaj  

Towards Formal Verification of Role-Based Access Control Policies [PDF]

open access: green, 2008
Somesh Jha   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy