Search

Your search keyword '"access-control"' showing total 15 results

Search Constraints

Start Over You searched for: Descriptor "access-control" Remove constraint Descriptor: "access-control" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
15 results on '"access-control"'

Search Results

1. Achieving resource-centric access control for web-app interactions on android

2. Evaluation of a policy enforcement solution in telemedicine with offline use cases.

4. Attribute-based credentials with cryptographic collusion prevention.

6. A Survey on Blockchain-based IoMT Systems: Towards Scalability

7. Privacy Models in Wireless Sensor Networks: A Survey

8. BOUNCER: Privacy-aware Query Processing Over Federations of RDF Datasets

9. BOUNCER: Privacy-aware Query Processing Over Federations of RDF Datasets

10. The Survey on Near Field Communication

11. ase-PoW: a proof of ownership mechanism for cloud deduplication in hierarchical environments

12. Model-based Analysis of Java EE Web Security Configurations

13. Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems

14. Formal Modeling and Verification of Access-Control Policies

15. Re-authentication of Critical Operations

Catalog

Books, media, physical & digital resources