Role-based access control provides a very flexible set of mechanisms for managing the access control of a complex system with many users, objects and applications. The role graph model of Nyanchama and Osborn is one example of how role administration algorithms can be implemented. In our previous re
โฆ LIBER โฆ
Honeynets: a tool for counterintelligence in online security
โ Scribed by David Watson
- Publisher
- Elsevier Science
- Year
- 2007
- Tongue
- English
- Weight
- 342 KB
- Volume
- 2007
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Integrating role graphs: a tool for secu
โ
Sylvia Osborn
๐
Article
๐
2002
๐
Elsevier Science
๐
English
โ 307 KB
Sputnik as a tool for securing geodetic
โ
Louis Gold
๐
Article
๐
1958
๐
Elsevier Science
๐
English
โ 166 KB
A simplified picture is employed for utilizing Sputnik tracking data (perigee, apogee, period, maximum and minimum orbital velocity) in the determination of the Earth's mass and radius. For this purpose, basic characteristics of the motion are conveniently re-expressed in terms of the perigee and ap
Relay margins as a tool for dynamical se
โ
F. Dobraca; M.A. Pai; P.W. Sauer
๐
Article
๐
1990
๐
Elsevier Science
๐
English
โ 724 KB
Operations research as a tool for analys
โ
C. Schweigman; E.J. Bakker; T.A.B. Snijders
๐
Article
๐
1990
๐
Elsevier Science
๐
English
โ 935 KB
A new ultra-fast contingency screening a
โ
H. K. Nam; Y. H. Kim; K. S. Shim; J. H. Choi; N. H. Kwak
๐
Article
๐
2008
๐
John Wiley and Sons
๐
English
โ 353 KB
A path context model for addressing secu
โ
W.H. Boshoff; S.H. von Solms
๐
Article
๐
1989
๐
Elsevier Science
๐
English
โ 919 KB