Books on the topic 'Role based access control (RBAC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 28 books for your research on the topic 'Role based access control (RBAC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Ferraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.
Find full textFerraiolo, David. Role-based access controls. Boston: Artech House, 2003.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control. and Technische Universität Berlin, eds. Proceedings, Fifth ACM Workshop on Role-Based Access Control: Berlin, Germany, July 26-27, 2000. New York, N.Y: ACM, 2000.
Find full textACM, Workshop on Role-Based Access Control (3rd 1998 Fairfax Va ). Proceedings: Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 22-23, 1998. New York, N.Y: ACM, 1998.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control., Association for Computing Machinery. Washington, D.C. Chapter., National Institute of Standards and Technology (U.S.), and George Mason University, eds. Proceedings, Fourth ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, October 28-29, 1999. New York, N.Y: ACM, 1999.
Find full textACM, Workshop on Role-Based Access Control (2nd 1997 Fairfax Virginia). Proceedings Second ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, November 6-7, 1997. New York: ACM, 1997.
Find full textACM Workshop on Role-Based Access Control (2nd 1997 Fairfax, Va.). Proceedings: Second ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, November 6-7, 1997. New York: Association for Computing Machinery, 1997.
Find full textACM Workshop on Role-Based Access Control (4th 1999 Fairfax, Virginia, USA). Proceedings: Fourth ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 28-29, 1999. New York: Association for Computing Machinery, 1999.
Find full textACM Workshop on Role-Based Access Control (1st 1995 Gaithersburg, Md.). Proceedings--First ACM Workshop on Role-Based Access Control: Gaithersburg, Maryland, USA, 30 November - 1 December 1995. New York, N.Y: Association for Computing Machinery, 1995.
Find full textWashington. Rbac 97: Second Acm Workshop on Role Based Access Control. Assn for Computing Machinery, 1997.
Find full textBischoff, Rainer, and Klaus-Peter Fischer-Hellmann. Information Flow Based Security Control Beyond RBAC: How to Enable Fine-Grained Security Policy Enforcement in Business Processes Beyond Limitations of Role-based Access Control. Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH, 2012.
Find full textFerraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control. Artech House Publishers, 2003.
Find full textFerraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control, Second Edition. 2nd ed. Artech House Publishers, 2007.
Find full textPietro, Roberto Di, Alessandro Colantonio, and Alberto Ocello. Role Mining in Business: Taming Role-Based Access Control Administration. World Scientific Publishing Co Pte Ltd, 2011.
Find full textA revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textA revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textRole-Based Access Control for Loosely Coupled Distributed Database Management Systems. Storming Media, 2002.
Find full textAn Application of Role-Based Access Control in an Organizational Software Process Knowledge Base. Storming Media, 2001.
Find full textProceedings, Fifth ACM Workshop on Role-Based Access Control: Berlin, Germany, July 26-27, 2000. ACM, 2000.
Find full textProceedings, Fourth ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, October 28-29, 1999. ACM, 1999.
Find full textDeighton, Chris. Rheumatoid arthritis—management. Oxford University Press, 2013. http://dx.doi.org/10.1093/med/9780199642489.003.0112.
Full textButler, Jay C., and Michael R. Fraser, eds. A Public Health Guide to Ending the Opioid Epidemic. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190056810.001.0001.
Full textStein, Elizabeth Ann. Information and Civil Unrest in Dictatorships. Oxford University Press, 2016. http://dx.doi.org/10.1093/acrefore/9780190228637.013.35.
Full text