Results 1 - 10
of
17,302
Proposed NIST Standard for Role-Based Access Control
, 2001
"... In this article we propose a standard for role-based access control (RBAC). Although RBAC models have received broad support as a generalized approach to access control, and are well recognized for their many advantages in performing large-scale authorization management, no single authoritative def ..."
Abstract
-
Cited by 544 (13 self)
- Add to MetaCart
In this article we propose a standard for role-based access control (RBAC). Although RBAC models have received broad support as a generalized approach to access control, and are well recognized for their many advantages in performing large-scale authorization management, no single authoritative
A Fast File System for UNIX
- ACM Transactions on Computer Systems
, 1984
"... A reimplementation of the UNIX file system is described. The reimplementation provides substantially higher throughput rates by using more flexible allocation policies that allow better locality of reference and can be adapted to a wide range of peripheral and processor characteristics. The new file ..."
Abstract
-
Cited by 565 (6 self)
- Add to MetaCart
to the programmers’ interface are discussed. These include a mechanism to place advisory locks on files, extensions of the name space across file systems, the ability to use long file names, and provisions for administrative control of resource usage.
The Cricket Location-Support System
, 2000
"... This paper presents the design, implementation, and evaluation of Cricket, a location-support system for in-building, mobile, locationdependent applications. It allows applications running on mobile and static nodes to learn their physical location by using listeners that hear and analyze informatio ..."
Abstract
-
Cited by 1058 (11 self)
- Add to MetaCart
information from beacons spread throughout the building. Cricket is the result of several design goals, including user privacy, decentralized administration, network heterogeneity, and low cost. Rather than explicitly tracking user location, Cricket helps devices learn where they are and lets them decide whom
Security-control methods for statistical databases: a comparative study
- ACM Computing Surveys
, 1989
"... This paper considers the problem of providing security to statistical databases against disclosure of confidential information. Security-control methods suggested in the literature are classified into four general approaches: conceptual, query restriction, data perturbation, and output perturbation. ..."
Abstract
-
Cited by 416 (0 self)
- Add to MetaCart
of the most promising methods for protecting dynamic-online statistical databases is also presented. To date no single security-control method prevents both exact and partial disclosures. There are, however, a few perturbation-based methods that prevent exact disclosure and enable the database administrator
Assessment ofSpecific Administrative Controls
, 2004
"... for the Design, Implementation, and Maintenance ofAdministrative Controls, calls for a report to the Secretary ofEnergy on the results ofsite reviews to confinn specific administrative controls are properly treated in safety basis documents and implementing procedures. Enclosed is the report from th ..."
Abstract
- Add to MetaCart
for the Design, Implementation, and Maintenance ofAdministrative Controls, calls for a report to the Secretary ofEnergy on the results ofsite reviews to confinn specific administrative controls are properly treated in safety basis documents and implementing procedures. Enclosed is the report from
Security property based administrative controls
- In Proceedings of the Ninth European Symposium on Research in Computer Security (ESORICS 2004
, 2004
"... Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with first order predicate logic or graph rewriting rules. We introduce a new access control model to implement administrative ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with first order predicate logic or graph rewriting rules. We introduce a new access control model to implement
Administrative procedures as instruments of political control
- Journal of Law, Economics, and Organization
, 1987
"... A central problem of representative democracy is how to ensure that policy decisions are responsive to the interests or preferences of citizens. The U.S. Constitution deals with the electoral side of this problem by con-structing institutional safeguards and incentive structures designed to make ele ..."
Abstract
-
Cited by 295 (8 self)
- Add to MetaCart
the principles of the political control of bureaucratic decisions. In so doing, we seek to develop a unifying conceptual framework lor two general types of controls: "oversight"—monitoring, rewarding, and punishing bureaucratic behavior—and administrative procedures. We begin with the premise
5.0 ADMINISTRATIVE CONTROLS
"... 5.1.1 The plant manager shall be responsible for overall unit operation and shall delegate in writing the succession to this responsibility during his absence. The plant manager or his designee shall approve, prior to implementation, each proposed test, experiment or modification to systems or equip ..."
Abstract
- Add to MetaCart
or equipment that affect nuclear safety. 5.1.2 The Shift Supervisor (SS) shall be responsible for the control room command function. During any absence of the SS from the control room while the unit is in MODE 1, 2, 3, or 4, an individual with an active Senior Reactor Operator (SRO) license shall be designated
ADMINISTRATIVE CONTROL IN THE SHIPYARD
"... {Scanned 2003-2-26 by Trygve Reenskaug. Some typos fixed, some probably added} ..."
Abstract
- Add to MetaCart
{Scanned 2003-2-26 by Trygve Reenskaug. Some typos fixed, some probably added}
County Administrator/Controller
, 2013
"... The questions you should be asking yourself as we consider the pros and cons of taking over the Road Commission are not “can it be done and how much will it cost?”, but rather, “will the result be better service to the residents of Berrien County and does doing so pose a risk to the delivery of othe ..."
Abstract
- Add to MetaCart
The questions you should be asking yourself as we consider the pros and cons of taking over the Road Commission are not “can it be done and how much will it cost?”, but rather, “will the result be better service to the residents of Berrien County and does doing so pose a risk to the delivery of other essential County services?”
Results 1 - 10
of
17,302