LEADER 01142nam a22002771i 4500 001 991001426789707536 005 20030226100025.0 008 021230s1990 it a||||||||||||||||ita 035 $ab12145488-39ule_inst 035 $aARCHE-023528$9ExL 040 $aDip.to Filologia Ling. e Lett.$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a391 100 1 $aTiole, Nicola Benedetto$0450763 245 10$aAlbum di costumi sardi riprodotti dal vero :$b1819-1826 /$cNicola Tiole ; saggi di Salvatore Naitza, Enrica Delitala, Luigi Piloni 260 $aNuoro :$bIstituto superiore regionale etnografico,$c[1990] 300 $a195 p. :$bill. ;$c30 cm 650 4$aCostumi regionali$xSardegna 700 1 $aNaitza, Salvatore 700 1 $aDelitala, Enrica 700 1 $aPiloni, Luigi 907 $a.b12145488$b02-04-14$c01-04-03 912 $a991001426789707536 945 $aLE008 FL.M. (TR.P.) I A 107$g1$i2008000369415$lle008$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i12472153$z01-04-03 996 $aAlbum di costumi sardi riprodotti dal vero$9149078 997 $aUNISALENTO 998 $ale008$b01-04-03$cm$da $e-$fita$git $h0$i1 LEADER 02625aam 2200553I 450 001 9910711181103321 005 20251223202847.0 024 8 $aGOVPUB-C13-5f6013b315834e266c4814b53bfe57ad 035 $a(CKB)5470000002480197 035 $a(OCoLC)927737013 035 $a(EXLCZ)995470000002480197 100 $a20151105d2014 ua 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aGuide to Attribute Based Access Control (ABAC) definition and considerations /$fV. C. Hu, D. Ferraiolo, D. R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, K. A. Scarfone 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d2014. 215 $a1 online resource 225 1 $aNIST special publication ;$v800-162 300 $a2014. 300 $aContributed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aTitle from PDF title page. 320 $aIncludes bibliographical references. 330 3 $aThis document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment conditions against policy, rules, or relationships that describe the allowable operations for a given set of attributes. This document also provides considerations for using ABAC to improve information sharing within organizations and between organizations while maintaining control of that information. 517 $aGuide to Attribute Based Access Control 610 $aAccess control 610 $aAccess control mechanism 610 $aAccess control model 610 $aAccess control policy 610 $aAttribute based access control (ABAC) 610 $aAuthorization 610 $aPrivilege 700 $aHu$b V. C$01410281 701 $aFerraiolo$b D$01410282 701 $aHu$b V. C$01410281 701 $aKuhn$b D. Richard$01162181 701 $aMiller$b R$0101765 701 $aSandlin$b K$01410284 701 $aScarfone$b K. A$01410285 701 $aSchnitzer$b Alexander$01410286 712 02$aNational Institute of Standards and Technology (U.S.).$bComputer Security Division. 801 0$bNBS 801 1$bNBS 801 2$bGPO 906 $aBOOK 912 $a9910711181103321 996 $aGuide to Attribute Based Access Control (ABAC) definition and considerations$94487591 997 $aUNINA