Show pagesourceOld revisionsBacklinksBack to top Share via Share via... Twitter LinkedIn Facebook Pinterest Telegram WhatsApp Yammer Reddit TeamsRecent ChangesSend via e-MailPrintPermalink × Table of Contents IT:AD:Architecture/Concerns/Security:Authorisation:Graph Based Summary References IT:AD:Architecture/Concerns/Security:Authorisation:Graph Based (UP) IT:AD:Architecture/Concerns/Security:Authorisation:Graph Based IT:AD:Design:Investigations:Security:Authorisation:ABAC IT:AD:Design:Investigations:Security:Authorisation:ABAC:XACML IT:AD:Design:Investigations:Security:Authorisation:CAP IT:AD:Design:Investigations:Security:Authorisation:DAC IT:AD:Design:Investigations:Security:Authorisation:DAC:Design IT:AD:Design:Investigations:Security:Authorisation:DAC:Security Descriptors IT:AD:Design:Investigations:Security:Authorisation:Distributed IT:AD:Design:Investigations:Security:Authorisation:PBAC IT:AD:Design:Investigations:Security:Authorisation:PBAC:Design IT:AD:Design:Investigations:Security:Authorisation:RBAC Summary Don't know enough about it comment. References ACL versus ACG http://www.javaworld.com/javaworld/jw-09-2004/jw-0913-acg.html /home/skysigal/public_html/data/pages/it/ad/design/investigations/security/authorisation/graph_based.txt Last modified: 2023/11/04 23:26by 127.0.0.1