Welcome to Boeklezers.nl

Boeklezers.nl is a network for social reading. We help readers discover new books and authors, and bring readers in contact with each other and with writers. Read more ».

Sign Up

Books

Enterprise Access Control Frameworks Using Rbac And Xml Technologies
Enterprise Access Control Frameworks Using Rbac And Xml Technologies
Chapter 11 from Role-Based Access Control, Volume 2 »
 
 
 
 
 

Privacy and Regulatory Issues
Privacy and Regulatory Issues
Chapter 7 from Role-Based Access Control, Volume 2 »
 
 
 
 
 

Introduction
Introduction
Chapter 1 from Role-Based Access Control »
 
 
 
 
 

Access Control
Access Control
Properties, Policies, and Models: Chapter21 from Role-Based Access Control »
 
 
 
 
 

Role Engineering
Role Engineering
Chapter 10 from Role-Based Access Control »
 
 
 
 
 

Role Hierarchies
Role Hierarchies
Chapter 4 from Role-Based Access Control »
 
 
 
 
 

Role-based Administration Of Rbac
Role-based Administration Of Rbac
Chapter 9 from Role-Based Access Control, Volume 2 »
 
 
 
 
 

Core Rbac Features
Core Rbac Features
Chapter 3 from Role-Based Access Control »
 
 
 
 
 

Sod And Constraints In Rbac Systems
Sod And Constraints In Rbac Systems
Chapter 5 from Role-Based Access Control, Volume 2 »
 
 
 
 
 

Rbac, Mac, And Dac
Rbac, Mac, And Dac
Chapter 6 from Role-Based Access Control, Volume 2 »