25,235 results
Search Results
2. Leverage Data Security Policies Complexity for Users: An End-to-End Storage Service Management in the Cloud Based on ABAC Attributes
3. Research on Authorization Model of Attribute Access Control Based on Knowledge Graph
4. Multilevel Trustworthiness for Improved Process and Network Security in Critical Infrastructures and Domains
5. A Process-Centric Approach to Insider Threats Identification in Information Systems
6. Virtual Private Network Blockchain-based Dynamic Access Control Solution for Inter-organisational Large Scale IoT Networks
7. Lightweight Capability-Based Access Control for Internet of Things (IoT)
8. Improving Data Security and Privacy for Ontology Based Data Access
9. Linking Contexts from Distinct Data Sources in Zero Trust Federation
10. Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper)
11. Blockchain-Based Social Network Access Control Mechanism
12. Audit and Analysis of Docker Tools for Vulnerability Detection and Tasks Execution in Secure Environment
13. Reliable and Controllable Data Sharing Based on Blockchain
14. Design of a High Efficiency Access Control and Authentication Analysis Model for Cloud Deployments Using Pattern Analysis
15. Architectural Optimization for Confidentiality Under Structural Uncertainty
16. Lightweight Authentication and Encryption for Online Monitoring in IIoT Environments
17. Digital Twin Monitoring for Cyber-Physical Access Control
18. Securing SCADA Critical Network Against Internal and External Threats : Short Paper
19. New Security Architecture of Access Control in 5G MEC
20. Example of Degrading Network Slicing System in Two-Service Retrial Queueing System
21. Software Defined Networks Centered Group Based Access Control Service for Internet of Things Applications
22. Blockchain-Based Access Control Mechanism in Electronic Evidence
23. Secure IoT Framework Through FSIE Approach
24. MurQRI: Encrypted Multi-layer QR Codes for Electronic Identity Management
25. Pathobox: The Collaborative Tele-pathology Platform with Access Management
26. A Priority-Based Domain Type Enforcement for Exception Management
27. Role Mining: Survey and Suggestion on Role Mining in Access Control
28. An Attack Detection and Defense Method for SDWN Oriented Blockchain Network
29. Secure Multi-Party Computation on Blockchain: An Overview
30. Pluggable Authentication Module Meets Identity-Based Identification
31. A New Electronic Contract System Model Based on Blockchain
32. Evaluating Pairing-Free Identity-Based Identification Using Curve25519
33. Research on the Role-Based Access Control Model and Data Security Method
34. The Database Fine-Grained Access SQL Statement Control Model Based on the Dynamic Query Modification Algorithm
35. This is Just Metadata: From No Communication Content to User Profiling, Surveillance and Exploitation
36. A Posteriori Analysis of Policy Temporal Compliance
37. A Mixed Model for Privacy Preserving and Secure Sharing of Medical Datasets
38. Blockchain-Based Access Control Schemes for Medical Image Analysis System
39. A Microservice Architecture for Access Control Based on Long-Distance Facial Recognition
40. An Approach to Multiple Security System Development Using Database Schemas
41. A Blockchain Based Approach to Resource Sharing in Smart Neighbourhoods
42. Command Dependencies in Heuristic Safety Analysis of Access Control Models
43. A Blockchain-Based Framework for Information Security in Intelligent Transportation Systems
44. Authentication of Choice on Mobile Devices: A Preliminary Investigation
45. A Solution to 'Confused Deputy' Problem Using RWFM Labels
46. ARBAC: Attribute-Enabled Role Based Access Control Model
47. An Improved Privacy-Preserving and Security Hybrid Access Control Mechanism
48. Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation
49. SC-RBAC: A Smart Contract based RBAC Model for DApps
50. Fine-Grained Access Control for Microservices
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.