To see the other types of publications on this topic, follow the link: Role based access control (RBAC).

Books on the topic 'Role based access control (RBAC)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 28 books for your research on the topic 'Role based access control (RBAC).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Ferraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ferraiolo, David. Role-based access controls. Boston: Artech House, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control. and Technische Universität Berlin, eds. Proceedings, Fifth ACM Workshop on Role-Based Access Control: Berlin, Germany, July 26-27, 2000. New York, N.Y: ACM, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

ACM, Workshop on Role-Based Access Control (3rd 1998 Fairfax Va ). Proceedings: Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 22-23, 1998. New York, N.Y: ACM, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., Association for Computing Machinery. Washington, D.C. Chapter., National Institute of Standards and Technology (U.S.), and George Mason University, eds. Proceedings, Fourth ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, October 28-29, 1999. New York, N.Y: ACM, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

ACM, Workshop on Role-Based Access Control (2nd 1997 Fairfax Virginia). Proceedings Second ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, November 6-7, 1997. New York: ACM, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

ACM Workshop on Role-Based Access Control (2nd 1997 Fairfax, Va.). Proceedings: Second ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, November 6-7, 1997. New York: Association for Computing Machinery, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

ACM Workshop on Role-Based Access Control (4th 1999 Fairfax, Virginia, USA). Proceedings: Fourth ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 28-29, 1999. New York: Association for Computing Machinery, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

ACM Workshop on Role-Based Access Control (1st 1995 Gaithersburg, Md.). Proceedings--First ACM Workshop on Role-Based Access Control: Gaithersburg, Maryland, USA, 30 November - 1 December 1995. New York, N.Y: Association for Computing Machinery, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Washington. Rbac 97: Second Acm Workshop on Role Based Access Control. Assn for Computing Machinery, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Bischoff, Rainer, and Klaus-Peter Fischer-Hellmann. Information Flow Based Security Control Beyond RBAC: How to Enable Fine-Grained Security Policy Enforcement in Business Processes Beyond Limitations of Role-based Access Control. Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ferraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control. Artech House Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Ferraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control, Second Edition. 2nd ed. Artech House Publishers, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Pietro, Roberto Di, Alessandro Colantonio, and Alberto Ocello. Role Mining in Business: Taming Role-Based Access Control Administration. World Scientific Publishing Co Pte Ltd, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Role-Based Access Control for Loosely Coupled Distributed Database Management Systems. Storming Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

An Application of Role-Based Access Control in an Organizational Software Process Knowledge Base. Storming Media, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Proceedings, Fifth ACM Workshop on Role-Based Access Control: Berlin, Germany, July 26-27, 2000. ACM, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Proceedings, Fourth ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, October 28-29, 1999. ACM, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Deighton, Chris. Rheumatoid arthritis—management. Oxford University Press, 2013. http://dx.doi.org/10.1093/med/9780199642489.003.0112.

Full text
Abstract:
Influential guidelines on rheumatoid arthritis (RA) management agree on most key recommendations. Early diagnosis of persistent synovitis, and identification of poor prognostic markers, is essential. Rapid intervention is vital with drugs to suppress inflammation, slow down damaging disease components, and prevent disability. The label of RA covers a broad spectrum of disease severity, and there is controversy on: • whether the same interventions are needed for all patients • whether monotherapy or combination treatment is appropriate • the role of steroids in RA • the appropriate introduction of biological therapies. Treating to specified targets is optimal evidence-based practice, where patients are reviewed regularly for disease activity assessments, and inadequate control rectified. Aiming for remission is the ultimate goal, though for some patients minimal disease activity may be appropriate. Patient education addressing self-management is important, and the multidisciplinary team (MDT: specialist nurses, physiotherapists, occupational therapists, podiatrists, psychologists) needs to be involved from the start to minimize the impact on quality of life of the patient. For established disease, rapid access is important for flares, and to consider whether disease management could be improved. An intermittent overview of established disease is important with access to the MDT, and assessments for comorbidities such as ischaemic heart disease, osteoporosis, and depression, as well as complications of the disease itself such as cervical spine disease, vasculitis, and lung and eye complications. An informed patient needs to be central to all decision making.
APA, Harvard, Vancouver, ISO, and other styles
27

Butler, Jay C., and Michael R. Fraser, eds. A Public Health Guide to Ending the Opioid Epidemic. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190056810.001.0001.

Full text
Abstract:
Few contributions to the field concerning the current opioid crisis in the United States focus sufficient attention on the public health aspects of the epidemic and share examples that practitioners can use to prevent opioid use disorder and the broader issues of substance misuse and addiction. A great deal of prior published work has concentrated on health care and clinical perspectives related to the crisis, including developing prescribing guidelines, enhancing prescription drug monitoring programs, scaling up access to overdose reversal medication, and making medication-assisted treatment more widely available nationwide. This book adds to and complements this prior work by addressing the central tenets of the public health approach to the opioid crisis. Topics include how to best support community-based, primary prevention of substance misuse and addiction in various settings with diverse populations and how to effectively address the cultural, social, and environmental aspects of health that are driving the epidemic. Chapters describe how governmental public health agencies play a significant role in responding to the epidemic, in both public health’s traditional approach to disease surveillance and control and contemporary approaches to health promotion that include building community resilience, addressing the impact of adverse childhood events, and mitigating the root causes of addiction community-wide. This volume can be used to explore what it means to address primary prevention of addiction and how public health practitioners have led efforts to promote “opioid stewardship” at the local, state, and federal levels.
APA, Harvard, Vancouver, ISO, and other styles
28

Stein, Elizabeth Ann. Information and Civil Unrest in Dictatorships. Oxford University Press, 2016. http://dx.doi.org/10.1093/acrefore/9780190228637.013.35.

Full text
Abstract:
Considering incidents that make headline news internationally, given the modern information and communication technology revolution, the facility of citizens to rapidly mobilize represents a considerable threat to autocratic survival. While the speed with which popular movements emerge has increased exponentially, and the news of their existence spreads faster and farther, civil unrest has threatened the stability and survival of dictators for centuries. The paranoia and machinations of dictators depicted in films, such as the portrayal of Ugandan dictator Idi Amin in The Last King of Scotland, while sensationalized, capture the astounding array of threats with which unelected leaders must concern themselves. On the one hand, they must worry about insider threats to their standing, such as conspiratorial plots from people within the dictator’s own circle or mutiny among government soldiers. On the other hand, dictators also must monitor threats originating from non-regime actors, such as new alliances forming among once-fragmented opposition groups or the possibility of sustained insurgency or a popular revolution. From force to finesse, autocratic leaders have developed a broad and evolving range of tactics and tools to diminish both internal and external domestic threats to their reign. The success of dictators’ endeavors to insulate their regimes from forces that might challenge them depends on accurate and reliable information, a resource that can be as valuable to the leader as would a large armory and loyal soldiers. Dictators invest significant resources (monetary as well as human capital) to try to gather useful information about their existing and potential opponents, while also trying to control and shape information emitted by the regime before it reaches the public. New information and communication technologies (ICTs), which have drawn a great deal of scholarly attention since the beginning of the 21st century—present both risks and rewards for dictators; inversely they also create new opportunities and hazards for citizens who might utilize them to mobilize people opposed to the regime. While civil unrest could encompass the full range of domestic, nonmilitary actors, there also needs to be a specific focus on various forms of mass mobilization. Historically, more dictators have been forced from office by elite-initiated overthrows via coups d’état than have fallen to revolution or fled amid street protests. Civil unrest, in its many forms, can affect autocratic survival or precipitate regime breakdown. While mass-based revolutions have been a relatively rare phenomenon to date, the actions of many 21st-century dictators indicate that they increasingly concern themselves with the threats posed by popular protests and fear its potential for triggering broader antigovernment campaigns. The ease of access to information (or the lack thereof) help explain interactions between authoritarian regimes and citizens emphasizes. The role of information in popular antigovernment mobilization has evolved and changed how dictators gather and utilize information to prevent or counter civil unrest that might jeopardize their own survival as well as that of the regime.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography