Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Oklahoma Department of Mental Health and Substance Abuse ...

    en.wikipedia.org/wiki/Oklahoma_Department_of...

    The ODMHSAS operates two state hospitals for adults and one children's psychiatric hospital: the Oklahoma Forensic Center, Griffin Memorial Hospital, and the Children's Recovery Center. Residential care services for adults with mental illness are provided by 25 separate residential home operators with which the ODMHSAS contracts.

  3. Terri L. White - Wikipedia

    en.wikipedia.org/wiki/Terri_L._White

    Terri L. White. Terri L. White (born 1973) is chief executive officer of the nonprofit Mental Health Association Oklahoma, as of August 2020. She is an American social worker who resigned effective February 1, 2020 as Commissioner of the Oklahoma Department of Mental Health and Substance Abuse Services, a position she has held since May 13, 2007.

  4. Access control - Wikipedia

    en.wikipedia.org/wiki/Access_control

    A sailor checks an identification card (ID) before allowing a vehicle to enter a military installation. In physical security and information security, access control ( AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or ...

  5. Northwest Center For Behavioral Health in Enid, OK - WebMD

    doctor.webmd.com/practice/northwest-center-for...

    Northwest Center For Behavioral Health Office Locations . Showing 1-2 of 2 Locations . PRIMARY LOCATION. Northwest Center For Behavioral Health . 702 N Grand St ...

  6. Mandatory access control - Wikipedia

    en.wikipedia.org/wiki/Mandatory_access_control

    Mandatory access control. In computer security, mandatory access control ( MAC) refers to a type of access control by which the operating system or database constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. [1] In the case of operating systems, a subject is usually a ...

  7. Role-based access control - Wikipedia

    en.wikipedia.org/wiki/Role-based_access_control

    Role-based access control is a policy-neutral access control mechanism defined around roles and privileges. The components of RBAC such as role-permissions, user-role and role-role relationships make it simple to perform user assignments. A study by NIST has demonstrated that RBAC addresses many needs of commercial and government organizations.

  8. Capability-based security - Wikipedia

    en.wikipedia.org/wiki/Capability-based_security

    Capability-based security is a concept in the design of secure computing systems, one of the existing security models. A capability (known in some systems as a key) is a communicable, unforgeable token of authority. It refers to a value that references an object along with an associated set of access rights. A user program on a capability-based ...

  9. Discretionary access control - Wikipedia

    en.wikipedia.org/wiki/Discretionary_access_control

    Discretionary access control. In computer security, discretionary access control ( DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria [1] (TCSEC) as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense ...