• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 3,252
Next 10 →

Table 1 Java Permissions

in Low-Level Code Safety Mechanisms 127
by High-level Code Safety 2005

Table 1. Permission Elements

in unknown title
by unknown authors
"... In PAGE 35: ...Table1... ..."

Table 2: Masking of Permissions

in This paper discusses file system Access Control Lists
by unknown authors

Table 3. IEC 61508 Causal Summary Chart for Case Study Incident

in Using Software Development Standards to Analyse Accidents Involving Electrical, Electronic or Programmable, Electronic Systems: The Blade Mill PLC Case Study
by C. W. Johnson, M. Bowell
"... In PAGE 11: ... All of these contributory factors were made more likely by the lack of a formal permission to work scheme of lockout procedures for ad hoc maintenance such as that performed on the circuit breakers. Table3 presents some of the results of mapping these causal factors back to violations in the IEC 61508 lifecycle requirements. A justification helps others to understand why investigators identified particular problems in the development or operation of the system.... In PAGE 14: ...Investigators can use the causal summary chart illustrated in Table3 to help identify potential recommendations. Table 4 illustrates one format that can be used to document and justify domain and incident dependent recommendations.... ..."

Table 1 Permission assignments for the example.

in SESAME: Scalable, Environment Sensitive Access Management Engine
by Guangsen Zhang, Manish Parashar
"... In PAGE 6: ... There are no inherent constraints on the number of roles and permissions, or on the relationships betweens the roles or permissions. To illus- trate our implementation, consider a simple example with a single user with three roles and a Grid resource with three permissions, as shown in Table1 and 2 respectively. The role and permission hierarchies for this example are shown in figure 9.... ..."

Table 3: Example of an administrative permission

in An Administration Concept for the Enterprise Role-Based Access Control Model
by Axel Kern, Andreas Schaad, Jonathan Moffett
"... In PAGE 4: ...Table 3: Example of an administrative permission Table3 shows an example permission. It authorises an ad- ministrator to view and change users, assign and deassign roles, and view roles and their assignments for the cost cen- ters 521, 5211 and 523 from the scope hierarchy in figure 4.... ..."

Table 3. Permissions Summary [24,31]. Resource Restricted Operations Java Permissions .NET Permissions

in Comparing Java and.NET Security: Lessons Learned and Missed
by Nathanael Paul, David Evans
"... In PAGE 9: ...NET it is possible to provide just append access to a file. Table3 reveals that both platforms suffer from the lack of a systematic design in their permissions. Many of these permissions are based on protecting methods provided by the platform API, rather than protecting security-critical resources.... ..."

Table VII. A Subset of Permissions Assignments in the CIE Permission

in X-GTRBAC: An XML-based Policy Specification Framework and Architecture for Enterprise-Wide Access Control
by Rafae Bhatti, Arif Ghafoor, Elisa Bertino, James B. D. Joshi 2005
Cited by 12

Table 4.1: Permission assignments for the example. Role Permissions

in Dynamic Context Aware Access Control for Grid Applications
by Guangsen Zhang

Table 4.2: Permission deflnition for the example. Permission Privileges

in Dynamic Context Aware Access Control for Grid Applications
by Guangsen Zhang
Next 10 →
Results 11 - 20 of 3,252
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University