Benantar, Messaoud
Access Control Systems
1. Foundations of Security and Access Control in Computing
2. Introduction to Identity-Management Models
3. Elements of Trust Paradigms in Computing
4. Mandatory-Access-Control Model
5. Discretionary-Access Control and the Access-Matrix Model
6. The Take-Grant Protection Model
7. The Schematic-Protection Model
8. Role-Based Access Control
DRM-restrictions
Printing: not available
Clipboard copying: not available
Keywords: COMPUTERS / Computer Science COM014000
- Author(s)
- Benantar, Messaoud
- Publisher
- Springer
- Publication year
- 2006
- Language
- en
- Edition
- 1
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9780387277165