• Graph-based access control (GBAC) is a declarative way to define access rights, task assignments, recipients and content in information systems. Access...
    6 KB (771 words) - 02:27, 12 August 2024
  • computer systems security, role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users, and to...
    19 KB (2,300 words) - 20:54, 16 January 2025
  • Attribute-based access control (ABAC), also known as policy-based access control for IAM, defines an access control paradigm whereby a subject's authorization...
    15 KB (1,822 words) - 21:59, 30 December 2024
  • Thumbnail for Organisation-based access control
    Access control list Attribute-Based Access Control (ABAC) Context-based access control (CBAC) Discretionary access control (DAC) Graph-based access control...
    3 KB (291 words) - 18:23, 10 July 2024
  • security, Relationship-based access control (ReBAC) defines an authorization paradigm where a subject's permission to access a resource is defined by...
    4 KB (445 words) - 04:37, 24 October 2024
  • In computer security, lattice-based access control (LBAC) is a complex access control model based on the interaction between any combination of objects...
    3 KB (339 words) - 12:40, 9 July 2024
  • Access control list Attribute-based access control (ABAC) Discretionary access control (DAC) Graph-based access control (GBAC) Lattice-based access control...
    4 KB (401 words) - 22:04, 30 December 2024
  • Thumbnail for Access control
    administrator may create a hierarchy of files to be accessed based on certain permissions. Graph-based Access Control (GBAC) Compared to other approaches like RBAC...
    50 KB (6,265 words) - 20:09, 1 May 2025
  • Access control list Attribute-based access control (ABAC) Context-based access control (CBAC) Graph-based access control (GBAC) Lattice-based access control...
    5 KB (563 words) - 14:06, 16 January 2025
  • Attribute-based access control (ABAC) Context-based access control (CBAC) Discretionary access control (DAC) Graph-based access control (GBAC) Lattice-based access...
    6 KB (706 words) - 20:03, 21 December 2024
  • Thumbnail for Knowledge graph
    knowledge graph is a knowledge base that uses a graph-structured data model or topology to represent and operate on data. Knowledge graphs are often used...
    21 KB (2,342 words) - 00:05, 28 March 2025
  • control (DAC) Graph-based access control (GBAC) Lattice-based access control (LBAC) Mandatory access control (MAC) Organisation-based access control (OrBAC)...
    6 KB (692 words) - 16:50, 23 January 2025
  • revision is based on its immediate predecessor alone, and they form a simple line, with a single latest version, the "HEAD" revision or tip. In graph theory...
    46 KB (6,250 words) - 23:47, 11 April 2025
  • Microsoft SQL/Server Graph GSQL also supports the concept of Multigraphs which allow subsets of a graph to have role-based access control. Multigraphs are...
    37 KB (4,272 words) - 10:42, 5 January 2025
  • A signal-flow graph or signal-flowgraph (SFG), invented by Claude Shannon, but often called a Mason graph after Samuel Jefferson Mason who coined the...
    76 KB (10,200 words) - 19:12, 2 November 2024
  • Thumbnail for Centrality
    In graph theory and network analysis, indicators of centrality assign numbers or rankings to nodes within a graph corresponding to their network position...
    47 KB (6,738 words) - 13:09, 11 March 2025
  • and greatest lower bounds Lattice-based access control, computer security systems based on partially ordered access privileges Skew lattice, a non-commutative...
    2 KB (333 words) - 08:55, 23 November 2023
  • OAuth (category Computer access control)
    security flaws. XACML is a policy-based, attribute-based access control authorization framework. It provides: An access control architecture. A policy language...
    27 KB (2,821 words) - 02:05, 17 April 2025
  • In mathematics, a graph partition is the reduction of a graph to a smaller graph by partitioning its set of nodes into mutually exclusive groups. Edges...
    25 KB (2,979 words) - 14:54, 18 December 2024
  • Thumbnail for Graph theory
    computer science, graph theory is the study of graphs, which are mathematical structures used to model pairwise relations between objects. A graph in this context...
    49 KB (6,208 words) - 02:57, 17 April 2025
  • TerminusDB (category Graph databases)
    an open source knowledge graph and document store. It is used to build versioned data products. It is a native revision control database that is architecturally...
    11 KB (784 words) - 13:44, 25 April 2025
  • Thumbnail for Cacti (software)
    Cacti (software) (category Internet Protocol based network software)
    WMI based data collection via the WMI Plugin Multiple Graph access permission Models for large scale deployments User and User Group access control Multiple...
    12 KB (1,307 words) - 16:33, 26 February 2025
  • Thumbnail for Entity linking
    which are widely different between languages. Graph-based entity linking uses features of the graph topology or multi-hop connections between entities...
    31 KB (3,664 words) - 15:52, 27 April 2025
  • Thumbnail for Graph isomorphism problem
    computer science Can the graph isomorphism problem be solved in polynomial time? More unsolved problems in computer science The graph isomorphism problem is...
    41 KB (4,214 words) - 00:03, 25 April 2025
  • Thumbnail for NetworkX
    NetworkX (category Graph drawing software)
    NetworkX is a Python library for studying graphs and networks. NetworkX is free software released under the BSD-new license. NetworkX began development...
    32 KB (3,290 words) - 12:11, 30 April 2025
  • Knowledge Graph, which produced instant answer panels alongside traditional search engine results. Later, results from querying the knowledge graph complemented...
    8 KB (676 words) - 19:18, 6 March 2025
  • Thumbnail for Semantic network
    used as a form of knowledge representation. It is a directed or undirected graph consisting of vertices, which represent concepts, and edges, which represent...
    31 KB (3,532 words) - 19:51, 8 March 2025
  • Commitment ordering (category Concurrency control)
    concurrency control method, together with the previously known (since the 1980s) three major methods: Locking, Time-stamp ordering, and Serialization graph testing...
    93 KB (12,831 words) - 15:42, 21 August 2024
  • the read, in turn, cannot affect whether any accesses execute (control dependence). Partial order based techniques are most often employed for online...
    14 KB (1,499 words) - 21:30, 20 August 2024
  • Voice Access is a mobile accessibility app developed by Google. Voice access lets users control their phones using their voices. Voice access is used...
    5 KB (335 words) - 21:31, 24 April 2025