language:
Find link is a tool written by Edward Betts.searching for Role-based access control 29 found (99 total)
alternate case: role-based access control
SQL:1999
(709 words)
[view diff]
no match in snippet
view article
find links to article
SQL:1999 (also called SQL 3) was the fourth revision of the SQL database query language. It introduced many new features, many of which required clarificationsIEC 62351 (467 words) [view diff] exact match in snippet view article find links to article
— Role-based access control. Covers the access control of users and automated agents to data objects in power systems by means of role-based access controlDelegated administration (496 words) [view diff] no match in snippet view article find links to article
administration or delegation of control describes the decentralization of role-based-access-control systems. Many enterprises use a centralized model of access controlBehavior tree (5,406 words) [view diff] exact match in snippet view article find links to article
and verified early in the development process. An integrated, role-based access control model has been developed. The model is based on the graphicalPERMIS (582 words) [view diff] case mismatch in snippet view article find links to article
National Institute of Standards and Technology (NIST) standard Role-Based Access Control (RBAC) model. PERMIS supports the distributed assignment of bothCacti (software) (1,305 words) [view diff] no match in snippet view article
supports both User and User Groups security models and supports Role Based Access Control (RBAC) for access to not only monitoring data, but various areasIEEE Innovation in Societal Infrastructure Award (335 words) [view diff] exact match in snippet view article find links to article
security through creation, development, and technology transfer of role-based access control (RBAC)." 2019: Andy Vidan, Paul Breimyer, and Gregory G. HoganCollaborative workflow (1,773 words) [view diff] case mismatch in snippet view article find links to article
collaboration, also relies on: Project and task infrastructures Role-Based Access Control (RBAC) Business rules to control workflow capabilities CollaborativeProcessWire (1,115 words) [view diff] exact match in snippet view article find links to article
page) installations Use of string-based selectors for API calls Role-based access control system Core development emphasis on security Markup agnostic outputProtocol implementation conformance statement (138 words) [view diff] exact match in snippet view article find links to article
policy enforcement in business processes beyond limitations of role-based access control (RBAC). Springer Science & Business Media. ISBN 978-3-8348-2618-3Elasticsearch (1,841 words) [view diff] exact match in snippet view article find links to article
communications, file and native realm for creating and managing users, and role-based access control for controlling user access to cluster APIs and indexes. The correspondingDistributed Access Control System (528 words) [view diff] exact match in snippet view article find links to article
arbitrary computations, it combines attribute-based access control, role-based access control, policy-based access control, delegated access control, and otherAkana (592 words) [view diff] no match in snippet view article find links to article
developer teams to work as a community with features such as role based access control. Lifecycle Manager – Akana's API Lifecycle Manager product helpsEucalyptus (software) (2,238 words) [view diff] no match in snippet view article
Microsoft Active Directory or LDAP systems to have fine-grained role based access control over cloud resources. Eucalyptus supports storage area networkO3Spaces (695 words) [view diff] no match in snippet view article find links to article
on open standards: WebDAV Opensearch CMIS Document security (Role based access control, Secure Connections, Backup, Restore & Archiving) LDAP IntegrationWorkforce optimization (516 words) [view diff] case mismatch in snippet view article find links to article
Vijayalakshmi (2017). "On Optimal Employee Assignment in Constrained Role-Based Access Control Systems". ACM Transactions on Management Information Systems.SAP IQ (3,204 words) [view diff] no match in snippet view article find links to article
of the user's data. A new feature introduced in IQ 16 is the Role Based Access Control (RBAC) which enables for a separation of duties and upholds theVoluntary Voting System Guidelines (1,418 words) [view diff] exact match in snippet view article find links to article
(pre-voting, activated, suspended, post-voting) Does not require role-based access control (RBAC) Requires multi-factor authentication for critical operations:Microsoft SQL Server Master Data Services (1,107 words) [view diff] exact match in snippet view article find links to article
which can be pulled by any SQL-compatible client. It uses a role-based access control system to restrict access to the data. The views are generatedMessage queuing service (817 words) [view diff] no match in snippet view article find links to article
Anypoint MQ is fully integrated with Anypoint Platform, offering role based access control, client application management, and connectors. Message queueHP Client Automation Software (642 words) [view diff] exact match in snippet view article find links to article
support Patch management for Adobe and Java software Target-wise role-based access control "HP Gets Real on Client Virtualization - Containers Expo Blog"Cloud management (2,329 words) [view diff] exact match in snippet view article find links to article
configurations. Integration with other IT assets and databases (CMDB) and role-based access control and governance are key. As a consolidated control plane for ITMac OS X Leopard (5,132 words) [view diff] exact match in snippet view article find links to article
filtered. Sandboxes Leopard includes kernel-level support for role-based access control (RBAC). RBAC is intended to prevent, for example, an applicationPlatform engineering (313 words) [view diff] case mismatch in snippet view article find links to article
Continuous Deployment (CD). For example: CircleCI, TravisCI, Role-Based Access Control: Manage who can do what in a scalable way. For example: CerbosTeleport (software) (916 words) [view diff] exact match in snippet view article
of Teleport (Teleport Enterprise) that includes features like role-based access control (RBAC). Teleport provides the following features, as detailedLuigi Logrippo (840 words) [view diff] no match in snippet view article find links to article
Adi, K., Logrippo, L., Mankovski, S. Risk Management in Dynamic Role Based Access Control Systems. Proc. of the 5th International Conference on DigitalList of Apache Software Foundation projects (4,615 words) [view diff] case mismatch in snippet view article find links to article
standards-based authorization platform that implements ANSI INCITS 359 Role-Based Access Control (RBAC) Kerby: Kerberos binding in Java LDAP API: an SDK for directoryGraph Query Language (4,323 words) [view diff] exact match in snippet view article find links to article
concept of Multigraphs which allow subsets of a graph to have role-based access control. Multigraphs are important for enterprise-scale graphs that needHistory of Microsoft Exchange Server (4,158 words) [view diff] no match in snippet view article find links to article
granular level due to Exchange Server 2010's implementation of Role Based Access Control (RBAC). Users and administrators can be given extremely fine-grained