Search

Your search keyword '"Authorization"' showing total 2,461 results

Search Constraints

Start Over You searched for: Descriptor "Authorization" Remove constraint Descriptor: "Authorization" Publisher ieee Remove constraint Publisher: ieee
2,461 results on '"Authorization"'

Search Results

1. FPRESSO: Fast and Privacy-Preserving SSO Authentication With Dynamic Load Balancing for Multi-Cloud-Based Web Applications

2. SAAC: Secure Access Control Management Framework for Multi-User Smart Home Systems

3. Ephemeral Secret Leakage-Free ID-Role-Based Access Control Authentication and Key Exchange Protocol for Securing Electric Vehicle Data

4. Protecting Your Online Persona: A Preferential Selective Encryption Approach for Enhanced Privacy in Tweets, Images, Memes, and Metadata

5. Blockchain-Based Authorization Mechanism for Educational Social Internet of Things

6. A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET

7. A Ranking Model for the Selection and Ranking of Commercial Off-the-Shelf Components.

8. Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem.

9. Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage.

10. Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata.

11. ANNPDP: An Efficient and Stable Evaluation Engine for Large-Scale Policy Sets.

12. iFaaSBus: A Security- and Privacy-Based Lightweight Framework for Serverless Computing Using IoT and Machine Learning.

13. A Consortium Blockchain-Based Access Control Framework With Dynamic Orderer Node Selection for 5G-Enabled Industrial IoT.

14. 3AS: Authentication, Authorization, and Accountability for SDN-Based Smart Grids

15. Survey on Delegated and Self-Contained Authorization Techniques in CPS and IoT

16. Practical Medical Files Sharing Scheme Based on Blockchain and Decentralized Attribute-Based Encryption

17. Trust Management Systems in Cloud Services Environment: Taxonomy of Reputation Attacks and Defense Mechanisms

18. Access Control in Fog Computing: Challenges and Research Agenda

19. A Privacy-Preserving Authentication, Authorization, and Key Agreement Scheme for Wireless Sensor Networks in 5G-Integrated Internet of Things

20. Single Sign-On: A Solution Approach to Address Inefficiencies During Sign-Out Process

21. An Authorized Public Auditing Scheme for Dynamic Big Data Storage in Cloud Computing

22. Block Chain Based Internet of Medical Things for Uninterrupted, Ubiquitous, User-Friendly, Unflappable, Unblemished, Unlimited Health Care Services (BC IoMT U6 HCS)

23. Privacy-Preserving Cloud Auditing for Multiple Users Scheme With Authorization and Traceability

24. Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements.

25. SILedger: A Blockchain and ABE-based Access Control for Applications in SDN-IoT Networks.

26. Delegated Authorization Framework for EHR Services Using Attribute-Based Encryption.

27. PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing.

28. Private Set Intersection With Authorization Over Outsourced Encrypted Datasets.

29. A Scalable and Secure Publish/Subscribe-Based Framework for Industrial IoT.

30. An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles.

31. Digital Twins for Intelligent Authorization in the B5G-Enabled Smart Grid.

32. Kollector: Detecting Fraudulent Activities on Mobile Devices Using Deep Learning.

33. Expressive Policy-Based Access Control for Resource-Constrained Devices

34. Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication.

35. Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement.

36. Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network.

37. Flexible Wildcard Searchable Encryption System.

38. Adaptive Trust Management for Soft Authentication and Progressive Authorization Relying on Physical Layer Attributes.

39. Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens.

40. The Informativeness of $k$ -Means for Learning Mixture Models.

41. BGP with BGPsec: Attacks and Countermeasures.

42. Security Middleground for Resource Protection in Measurement Infrastructure-as-a-Service.

43. Overview of Device Access Control in the IoT and its Challenges.

44. Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control.

45. Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources.

46. MEICAN: Simplifying DCN Life-Cycle Management from End-User and Operator Perspectives in Inter-Domain Environments.

47. SecRBAC: Secure data in the Clouds.

48. Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data.

49. CABA: Continuous Authentication Based on BioAura.

50. Secure Real-Time Monitoring and Management of Smart Distribution Grid Using Shared Cellular Networks.

Catalog

Books, media, physical & digital resources