Graph-based access control (GBAC) is a declarative way to define access rights, task assignments, recipients and content in information systems. Access...
6 KB (771 words) - 02:27, 12 August 2024
computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users, and to...
19 KB (2,300 words) - 20:54, 16 January 2025
Attribute-based access control (ABAC), also known as policy-based access control for IAM, defines an access control paradigm whereby a subject's authorization...
15 KB (1,822 words) - 21:59, 30 December 2024
Access control list Attribute-Based Access Control (ABAC) Context-based access control (CBAC) Discretionary access control (DAC) Graph-based access control...
3 KB (291 words) - 18:23, 10 July 2024
security, Relationship-based access control (ReBAC) defines an authorization paradigm where a subject's permission to access a resource is defined by...
4 KB (445 words) - 04:37, 24 October 2024
In computer security, lattice-based access control (LBAC) is a complex access control model based on the interaction between any combination of objects...
3 KB (339 words) - 12:40, 9 July 2024
Access control list Attribute-based access control (ABAC) Discretionary access control (DAC) Graph-based access control (GBAC) Lattice-based access control...
4 KB (401 words) - 22:04, 30 December 2024
administrator may create a hierarchy of files to be accessed based on certain permissions. Graph-based Access Control (GBAC) Compared to other approaches like RBAC...
50 KB (6,265 words) - 20:09, 1 May 2025
Access control list Attribute-based access control (ABAC) Context-based access control (CBAC) Graph-based access control (GBAC) Lattice-based access control...
5 KB (563 words) - 14:06, 16 January 2025
RSBAC (redirect from Rule-set-based access control)
Attribute-based access control (ABAC) Context-based access control (CBAC) Discretionary access control (DAC) Graph-based access control (GBAC) Lattice-based access...
6 KB (706 words) - 20:03, 21 December 2024
knowledge graph is a knowledge base that uses a graph-structured data model or topology to represent and operate on data. Knowledge graphs are often used...
21 KB (2,342 words) - 00:05, 28 March 2025
control (DAC) Graph-based access control (GBAC) Lattice-based access control (LBAC) Mandatory access control (MAC) Organisation-based access control (OrBAC)...
6 KB (692 words) - 16:50, 23 January 2025
revision is based on its immediate predecessor alone, and they form a simple line, with a single latest version, the "HEAD" revision or tip. In graph theory...
46 KB (6,250 words) - 23:47, 11 April 2025
Microsoft SQL/Server Graph GSQL also supports the concept of Multigraphs which allow subsets of a graph to have role-based access control. Multigraphs are...
37 KB (4,272 words) - 10:42, 5 January 2025
A signal-flow graph or signal-flowgraph (SFG), invented by Claude Shannon, but often called a Mason graph after Samuel Jefferson Mason who coined the...
76 KB (10,200 words) - 19:12, 2 November 2024
Centrality (redirect from Closeness (graph theory))
In graph theory and network analysis, indicators of centrality assign numbers or rankings to nodes within a graph corresponding to their network position...
47 KB (6,738 words) - 13:09, 11 March 2025
and greatest lower bounds Lattice-based access control, computer security systems based on partially ordered access privileges Skew lattice, a non-commutative...
2 KB (333 words) - 08:55, 23 November 2023
OAuth (category Computer access control)
security flaws. XACML is a policy-based, attribute-based access control authorization framework. It provides: An access control architecture. A policy language...
27 KB (2,821 words) - 02:05, 17 April 2025
In mathematics, a graph partition is the reduction of a graph to a smaller graph by partitioning its set of nodes into mutually exclusive groups. Edges...
25 KB (2,979 words) - 14:54, 18 December 2024
computer science, graph theory is the study of graphs, which are mathematical structures used to model pairwise relations between objects. A graph in this context...
49 KB (6,208 words) - 02:57, 17 April 2025
TerminusDB (category Graph databases)
an open source knowledge graph and document store. It is used to build versioned data products. It is a native revision control database that is architecturally...
11 KB (784 words) - 13:44, 25 April 2025
Cacti (software) (category Internet Protocol based network software)
WMI based data collection via the WMI Plugin Multiple Graph access permission Models for large scale deployments User and User Group access control Multiple...
12 KB (1,307 words) - 16:33, 26 February 2025
Entity linking (section Graph-based)
which are widely different between languages. Graph-based entity linking uses features of the graph topology or multi-hop connections between entities...
31 KB (3,664 words) - 15:52, 27 April 2025
computer science Can the graph isomorphism problem be solved in polynomial time? More unsolved problems in computer science The graph isomorphism problem is...
41 KB (4,214 words) - 00:03, 25 April 2025
NetworkX (category Graph drawing software)
NetworkX is a Python library for studying graphs and networks. NetworkX is free software released under the BSD-new license. NetworkX began development...
32 KB (3,290 words) - 12:11, 30 April 2025
Knowledge Graph, which produced instant answer panels alongside traditional search engine results. Later, results from querying the knowledge graph complemented...
8 KB (676 words) - 19:18, 6 March 2025
used as a form of knowledge representation. It is a directed or undirected graph consisting of vertices, which represent concepts, and edges, which represent...
31 KB (3,532 words) - 19:51, 8 March 2025
Commitment ordering (category Concurrency control)
concurrency control method, together with the previously known (since the 1980s) three major methods: Locking, Time-stamp ordering, and Serialization graph testing...
93 KB (12,831 words) - 15:42, 21 August 2024
the read, in turn, cannot affect whether any accesses execute (control dependence). Partial order based techniques are most often employed for online...
14 KB (1,499 words) - 21:30, 20 August 2024
Voice Access is a mobile accessibility app developed by Google. Voice access lets users control their phones using their voices. Voice access is used...
5 KB (335 words) - 21:31, 24 April 2025