Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Role-based access control 30 found (99 total)

alternate case: role-based access control

SQL:1999 (722 words) [view diff] no match in snippet view article find links to article

SQL:1999 (also called SQL 3) was the fourth revision of the SQL database query language. It introduced many new features, many of which required clarifications
IEC 62351 (486 words) [view diff] exact match in snippet view article find links to article
Role-based access control. Covers the access control of users and automated agents to data objects in power systems by means of role-based access control
Delegated administration (496 words) [view diff] no match in snippet view article find links to article
administration or delegation of control describes the decentralization of role-based-access-control systems. Many enterprises use a centralized model of access control
Behavior tree (5,226 words) [view diff] exact match in snippet view article find links to article
and verified early in the development process. An integrated, role-based access control model has been developed. The model is based on the graphical
Cacti (software) (1,307 words) [view diff] no match in snippet view article
supports both User and User Groups security models and supports Role Based Access Control (RBAC) for access to not only monitoring data, but various areas
PERMIS (582 words) [view diff] case mismatch in snippet view article find links to article
National Institute of Standards and Technology (NIST) standard Role-Based Access Control (RBAC) model. PERMIS supports the distributed assignment of both
IEEE Innovation in Societal Infrastructure Award (335 words) [view diff] exact match in snippet view article find links to article
security through creation, development, and technology transfer of role-based access control (RBAC)." 2019: Andy Vidan, Paul Breimyer, and Gregory G. Hogan
Collaborative workflow (1,773 words) [view diff] case mismatch in snippet view article find links to article
collaboration, also relies on: Project and task infrastructures Role-Based Access Control (RBAC) Business rules to control workflow capabilities Collaborative
Elasticsearch (1,645 words) [view diff] exact match in snippet view article find links to article
communications, file and native realm for creating and managing users, and role-based access control for controlling user access to cluster APIs and indexes. The corresponding
ProcessWire (1,115 words) [view diff] exact match in snippet view article find links to article
page) installations Use of string-based selectors for API calls Role-based access control system Core development emphasis on security Markup agnostic output
Protocol implementation conformance statement (138 words) [view diff] exact match in snippet view article find links to article
policy enforcement in business processes beyond limitations of role-based access control (RBAC). Springer Science & Business Media. ISBN 978-3-8348-2618-3
Distributed Access Control System (533 words) [view diff] exact match in snippet view article find links to article
arbitrary computations, it combines attribute-based access control, role-based access control, policy-based access control, delegated access control, and other
Firebase (916 words) [view diff] case mismatch in snippet view article find links to article
opted out". Reuters. July 14, 2020. Retrieved July 14, 2020. "Role-Based Access Control in Cloud Firestore". Aravind Chowdary. July 14, 2020. Retrieved
Akana (592 words) [view diff] no match in snippet view article find links to article
developer teams to work as a community with features such as role based access control. Lifecycle Manager – Akana's API Lifecycle Manager product helps
O3Spaces (657 words) [view diff] no match in snippet view article find links to article
on open standards: WebDAV Opensearch CMIS Document security (Role based access control, Secure Connections, Backup, Restore & Archiving) LDAP Integration
Eucalyptus (software) (2,245 words) [view diff] no match in snippet view article
Microsoft Active Directory or LDAP systems to have fine-grained role based access control over cloud resources. Eucalyptus supports storage area network
SAP IQ (3,206 words) [view diff] no match in snippet view article find links to article
of the user's data. A new feature introduced in IQ 16 is the Role Based Access Control (RBAC) which enables for a separation of duties and upholds the
Voluntary Voting System Guidelines (1,407 words) [view diff] exact match in snippet view article find links to article
(pre-voting, activated, suspended, post-voting) Does not require role-based access control (RBAC) Requires multi-factor authentication for critical operations:
Workforce optimization (517 words) [view diff] case mismatch in snippet view article find links to article
Vijayalakshmi (2017). "On Optimal Employee Assignment in Constrained Role-Based Access Control Systems". ACM Transactions on Management Information Systems.
Microsoft SQL Server Master Data Services (1,107 words) [view diff] exact match in snippet view article find links to article
which can be pulled by any SQL-compatible client. It uses a role-based access control system to restrict access to the data. The views are generated
Message queuing service (1,040 words) [view diff] no match in snippet view article find links to article
Anypoint MQ is fully integrated with Anypoint Platform, offering role based access control, client application management, and connectors. Message queue
HP Client Automation Software (650 words) [view diff] exact match in snippet view article find links to article
support Patch management for Adobe and Java software Target-wise role-based access control "HP Gets Real on Client Virtualization - Containers Expo Blog"
Cloud management (2,329 words) [view diff] exact match in snippet view article find links to article
configurations. Integration with other IT assets and databases (CMDB) and role-based access control and governance are key. As a consolidated control plane for IT
Mac OS X Leopard (5,147 words) [view diff] exact match in snippet view article find links to article
filtered. Sandboxes Leopard includes kernel-level support for role-based access control (RBAC). RBAC is intended to prevent, for example, an application
Luigi Logrippo (840 words) [view diff] no match in snippet view article find links to article
Adi, K., Logrippo, L., Mankovski, S. Risk Management in Dynamic Role Based Access Control Systems. Proc. of the 5th International Conference on Digital
Teleport (software) (925 words) [view diff] exact match in snippet view article
of Teleport (Teleport Enterprise) that includes features like role-based access control (RBAC). Teleport provides the following features, as detailed
List of Apache Software Foundation projects (4,300 words) [view diff] case mismatch in snippet view article find links to article
standards-based authorization platform that implements ANSI INCITS 359 Role-Based Access Control (RBAC) Kerby: Kerberos binding in Java LDAP API: an SDK for directory
Milvus (vector database) (880 words) [view diff] exact match in snippet view article
collection-oriented, partition-oriented) Memory-mapped data storage Role-based access control Multi-vector and hybrid search Milvus can be deployed as an embedded
Graph Query Language (4,272 words) [view diff] exact match in snippet view article find links to article
concept of Multigraphs which allow subsets of a graph to have role-based access control. Multigraphs are important for enterprise-scale graphs that need
History of Microsoft Exchange Server (4,286 words) [view diff] no match in snippet view article find links to article
granular level due to Exchange Server 2010's implementation of Role Based Access Control (RBAC). Users and administrators can be given extremely fine-grained