Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Role-based access control 29 found (99 total)

alternate case: role-based access control

SQL:1999 (709 words) [view diff] no match in snippet view article find links to article

SQL:1999 (also called SQL 3) was the fourth revision of the SQL database query language. It introduced many new features, many of which required clarifications
IEC 62351 (467 words) [view diff] exact match in snippet view article find links to article
Role-based access control. Covers the access control of users and automated agents to data objects in power systems by means of role-based access control
Delegated administration (496 words) [view diff] no match in snippet view article find links to article
administration or delegation of control describes the decentralization of role-based-access-control systems. Many enterprises use a centralized model of access control
Behavior tree (5,406 words) [view diff] exact match in snippet view article find links to article
and verified early in the development process. An integrated, role-based access control model has been developed. The model is based on the graphical
PERMIS (582 words) [view diff] case mismatch in snippet view article find links to article
National Institute of Standards and Technology (NIST) standard Role-Based Access Control (RBAC) model. PERMIS supports the distributed assignment of both
Cacti (software) (1,305 words) [view diff] no match in snippet view article
supports both User and User Groups security models and supports Role Based Access Control (RBAC) for access to not only monitoring data, but various areas
IEEE Innovation in Societal Infrastructure Award (335 words) [view diff] exact match in snippet view article find links to article
security through creation, development, and technology transfer of role-based access control (RBAC)." 2019: Andy Vidan, Paul Breimyer, and Gregory G. Hogan
Collaborative workflow (1,773 words) [view diff] case mismatch in snippet view article find links to article
collaboration, also relies on: Project and task infrastructures Role-Based Access Control (RBAC) Business rules to control workflow capabilities Collaborative
ProcessWire (1,115 words) [view diff] exact match in snippet view article find links to article
page) installations Use of string-based selectors for API calls Role-based access control system Core development emphasis on security Markup agnostic output
Protocol implementation conformance statement (138 words) [view diff] exact match in snippet view article find links to article
policy enforcement in business processes beyond limitations of role-based access control (RBAC). Springer Science & Business Media. ISBN 978-3-8348-2618-3
Elasticsearch (1,841 words) [view diff] exact match in snippet view article find links to article
communications, file and native realm for creating and managing users, and role-based access control for controlling user access to cluster APIs and indexes. The corresponding
Distributed Access Control System (528 words) [view diff] exact match in snippet view article find links to article
arbitrary computations, it combines attribute-based access control, role-based access control, policy-based access control, delegated access control, and other
Akana (592 words) [view diff] no match in snippet view article find links to article
developer teams to work as a community with features such as role based access control. Lifecycle Manager – Akana's API Lifecycle Manager product helps
Eucalyptus (software) (2,238 words) [view diff] no match in snippet view article
Microsoft Active Directory or LDAP systems to have fine-grained role based access control over cloud resources. Eucalyptus supports storage area network
O3Spaces (695 words) [view diff] no match in snippet view article find links to article
on open standards: WebDAV Opensearch CMIS Document security (Role based access control, Secure Connections, Backup, Restore & Archiving) LDAP Integration
Workforce optimization (516 words) [view diff] case mismatch in snippet view article find links to article
Vijayalakshmi (2017). "On Optimal Employee Assignment in Constrained Role-Based Access Control Systems". ACM Transactions on Management Information Systems.
SAP IQ (3,204 words) [view diff] no match in snippet view article find links to article
of the user's data. A new feature introduced in IQ 16 is the Role Based Access Control (RBAC) which enables for a separation of duties and upholds the
Voluntary Voting System Guidelines (1,418 words) [view diff] exact match in snippet view article find links to article
(pre-voting, activated, suspended, post-voting) Does not require role-based access control (RBAC) Requires multi-factor authentication for critical operations:
Microsoft SQL Server Master Data Services (1,107 words) [view diff] exact match in snippet view article find links to article
which can be pulled by any SQL-compatible client. It uses a role-based access control system to restrict access to the data. The views are generated
Message queuing service (817 words) [view diff] no match in snippet view article find links to article
Anypoint MQ is fully integrated with Anypoint Platform, offering role based access control, client application management, and connectors. Message queue
HP Client Automation Software (642 words) [view diff] exact match in snippet view article find links to article
support Patch management for Adobe and Java software Target-wise role-based access control "HP Gets Real on Client Virtualization - Containers Expo Blog"
Cloud management (2,329 words) [view diff] exact match in snippet view article find links to article
configurations. Integration with other IT assets and databases (CMDB) and role-based access control and governance are key. As a consolidated control plane for IT
Mac OS X Leopard (5,132 words) [view diff] exact match in snippet view article find links to article
filtered. Sandboxes Leopard includes kernel-level support for role-based access control (RBAC). RBAC is intended to prevent, for example, an application
Teleport (software) (916 words) [view diff] exact match in snippet view article
of Teleport (Teleport Enterprise) that includes features like role-based access control (RBAC). Teleport provides the following features, as detailed
Platform engineering (325 words) [view diff] case mismatch in snippet view article find links to article
Continuous Deployment (CD). For example: CircleCI, TravisCI, Role-Based Access Control: Manage who can do what in a scalable way. For example: Cerbos
Luigi Logrippo (840 words) [view diff] no match in snippet view article find links to article
Adi, K., Logrippo, L., Mankovski, S. Risk Management in Dynamic Role Based Access Control Systems. Proc. of the 5th International Conference on Digital
List of Apache Software Foundation projects (4,615 words) [view diff] case mismatch in snippet view article find links to article
standards-based authorization platform that implements ANSI INCITS 359 Role-Based Access Control (RBAC) Kerby: Kerberos binding in Java LDAP API: an SDK for directory
Graph Query Language (4,323 words) [view diff] exact match in snippet view article find links to article
concept of Multigraphs which allow subsets of a graph to have role-based access control. Multigraphs are important for enterprise-scale graphs that need
History of Microsoft Exchange Server (4,158 words) [view diff] no match in snippet view article find links to article
granular level due to Exchange Server 2010's implementation of Role Based Access Control (RBAC). Users and administrators can be given extremely fine-grained