language:
Find link is a tool written by Edward Betts.searching for Role-based access control 30 found (99 total)
alternate case: role-based access control
SQL:1999
(722 words)
[view diff]
no match in snippet
view article
find links to article
SQL:1999 (also called SQL 3) was the fourth revision of the SQL database query language. It introduced many new features, many of which required clarificationsIEC 62351 (486 words) [view diff] exact match in snippet view article find links to article
— Role-based access control. Covers the access control of users and automated agents to data objects in power systems by means of role-based access controlDelegated administration (496 words) [view diff] no match in snippet view article find links to article
administration or delegation of control describes the decentralization of role-based-access-control systems. Many enterprises use a centralized model of access controlBehavior tree (5,226 words) [view diff] exact match in snippet view article find links to article
and verified early in the development process. An integrated, role-based access control model has been developed. The model is based on the graphicalCacti (software) (1,307 words) [view diff] no match in snippet view article
supports both User and User Groups security models and supports Role Based Access Control (RBAC) for access to not only monitoring data, but various areasPERMIS (582 words) [view diff] case mismatch in snippet view article find links to article
National Institute of Standards and Technology (NIST) standard Role-Based Access Control (RBAC) model. PERMIS supports the distributed assignment of bothIEEE Innovation in Societal Infrastructure Award (335 words) [view diff] exact match in snippet view article find links to article
security through creation, development, and technology transfer of role-based access control (RBAC)." 2019: Andy Vidan, Paul Breimyer, and Gregory G. HoganCollaborative workflow (1,773 words) [view diff] case mismatch in snippet view article find links to article
collaboration, also relies on: Project and task infrastructures Role-Based Access Control (RBAC) Business rules to control workflow capabilities CollaborativeElasticsearch (1,645 words) [view diff] exact match in snippet view article find links to article
communications, file and native realm for creating and managing users, and role-based access control for controlling user access to cluster APIs and indexes. The correspondingProcessWire (1,115 words) [view diff] exact match in snippet view article find links to article
page) installations Use of string-based selectors for API calls Role-based access control system Core development emphasis on security Markup agnostic outputProtocol implementation conformance statement (138 words) [view diff] exact match in snippet view article find links to article
policy enforcement in business processes beyond limitations of role-based access control (RBAC). Springer Science & Business Media. ISBN 978-3-8348-2618-3Distributed Access Control System (533 words) [view diff] exact match in snippet view article find links to article
arbitrary computations, it combines attribute-based access control, role-based access control, policy-based access control, delegated access control, and otherFirebase (916 words) [view diff] case mismatch in snippet view article find links to article
opted out". Reuters. July 14, 2020. Retrieved July 14, 2020. "Role-Based Access Control in Cloud Firestore". Aravind Chowdary. July 14, 2020. RetrievedAkana (592 words) [view diff] no match in snippet view article find links to article
developer teams to work as a community with features such as role based access control. Lifecycle Manager – Akana's API Lifecycle Manager product helpsO3Spaces (657 words) [view diff] no match in snippet view article find links to article
on open standards: WebDAV Opensearch CMIS Document security (Role based access control, Secure Connections, Backup, Restore & Archiving) LDAP IntegrationEucalyptus (software) (2,245 words) [view diff] no match in snippet view article
Microsoft Active Directory or LDAP systems to have fine-grained role based access control over cloud resources. Eucalyptus supports storage area networkSAP IQ (3,206 words) [view diff] no match in snippet view article find links to article
of the user's data. A new feature introduced in IQ 16 is the Role Based Access Control (RBAC) which enables for a separation of duties and upholds theVoluntary Voting System Guidelines (1,407 words) [view diff] exact match in snippet view article find links to article
(pre-voting, activated, suspended, post-voting) Does not require role-based access control (RBAC) Requires multi-factor authentication for critical operations:Workforce optimization (517 words) [view diff] case mismatch in snippet view article find links to article
Vijayalakshmi (2017). "On Optimal Employee Assignment in Constrained Role-Based Access Control Systems". ACM Transactions on Management Information Systems.Microsoft SQL Server Master Data Services (1,107 words) [view diff] exact match in snippet view article find links to article
which can be pulled by any SQL-compatible client. It uses a role-based access control system to restrict access to the data. The views are generatedMessage queuing service (1,040 words) [view diff] no match in snippet view article find links to article
Anypoint MQ is fully integrated with Anypoint Platform, offering role based access control, client application management, and connectors. Message queueHP Client Automation Software (650 words) [view diff] exact match in snippet view article find links to article
support Patch management for Adobe and Java software Target-wise role-based access control "HP Gets Real on Client Virtualization - Containers Expo Blog"Cloud management (2,329 words) [view diff] exact match in snippet view article find links to article
configurations. Integration with other IT assets and databases (CMDB) and role-based access control and governance are key. As a consolidated control plane for ITMac OS X Leopard (5,147 words) [view diff] exact match in snippet view article find links to article
filtered. Sandboxes Leopard includes kernel-level support for role-based access control (RBAC). RBAC is intended to prevent, for example, an applicationLuigi Logrippo (840 words) [view diff] no match in snippet view article find links to article
Adi, K., Logrippo, L., Mankovski, S. Risk Management in Dynamic Role Based Access Control Systems. Proc. of the 5th International Conference on DigitalTeleport (software) (925 words) [view diff] exact match in snippet view article
of Teleport (Teleport Enterprise) that includes features like role-based access control (RBAC). Teleport provides the following features, as detailedList of Apache Software Foundation projects (4,300 words) [view diff] case mismatch in snippet view article find links to article
standards-based authorization platform that implements ANSI INCITS 359 Role-Based Access Control (RBAC) Kerby: Kerberos binding in Java LDAP API: an SDK for directoryMilvus (vector database) (880 words) [view diff] exact match in snippet view article
collection-oriented, partition-oriented) Memory-mapped data storage Role-based access control Multi-vector and hybrid search Milvus can be deployed as an embeddedGraph Query Language (4,272 words) [view diff] exact match in snippet view article find links to article
concept of Multigraphs which allow subsets of a graph to have role-based access control. Multigraphs are important for enterprise-scale graphs that needHistory of Microsoft Exchange Server (4,286 words) [view diff] no match in snippet view article find links to article
granular level due to Exchange Server 2010's implementation of Role Based Access Control (RBAC). Users and administrators can be given extremely fine-grained