Search

Your search keyword '"Discretionary access control"' showing total 490 results

Search Constraints

Start Over You searched for: Descriptor "Discretionary access control" Remove constraint Descriptor: "Discretionary access control" Topic computer science Remove constraint Topic: computer science
490 results on '"Discretionary access control"'

Search Results

1. Secure Trusted Operating System Based on Microkernel Architecture

2. Solid over the Interplanetary File System

3. A Scalable Role Mining Approach for Large Organizations

4. A safe architecture for authorisation grant in healthcare ecosystems

5. Blockchain Platforms and Access Control Classification for IoT Systems

6. Modeling Transformations of Information Links in the Cybersecurity Architecture of Systems Using Algorithms on Graphs and the 'Take-Grant' Formal Model

7. Strengthen Electronic Health Records System (EHR-S) Access-Control to Cope with GDPR Explicit Consent

8. Developing and Assessing an Educational Game for Teaching Access Control

9. A Model-Driven Framework for Ensuring Role Based Access Control in IoT Devices

10. Remote Access Control Model for MQTT Protocol

11. Exploring the Access Control Policies of Web-Based Social Network

12. An Adaptation of Context and Trust Aware Workflow Oriented Access Control for Remote Healthcare

13. Multi-user permission strategy to access sensitive information

14. A trusted access method in software-defined network

15. Current Research and Open Problems in Attribute-Based Access Control

16. Designing Application Permission Models that Meet User Expectations

17. On the Feasibility of Attribute-Based Access Control Policy Mining

18. Towards Integrating Attribute-Based Access Control into Ontologies

19. From Access Control Models to Access Control Metamodels: A Survey

20. The Design and Implementation of a Linux Kernel Module for File Descriptor Revocation

21. Effective Security and Access Control Framework for Multilevel Organizations

22. Discretionary Access Control Method to Protect Blockchain Privacy

23. KDP scheme of preliminary key distribution in discretionary security policy

24. EACF: extensible access control framework for cloud environments

25. An extended access control mechanism exploiting data dependencies

26. Privacy preserving and delegated access control for cloud applications

27. A Precedent Approach to Assigning Access Rights

28. Multilayer Access for Database Protection

29. Attribute-Based Access Control in Web Applications

30. Attaining Role-Based, Mandatory, and Discretionary Access Control for Services by Intercepting API Calls in Mobile Systems

31. Ensuring Security in Cloud Computing Using Access Control: A Survey

32. Android Access Control Extension

33. Analysis of SEAndroid Policies

34. Authorization Contracts

35. Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration

36. Different Access Control Mechanisms for Data Security in Cloud Computing

37. An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security

38. New access control policies for private network and protocol security

39. A Semi-Formal Multi-Policy Secure Model for Semantic Spatial Trajectories

40. Logical Language of Certificate-Based Access Control in Security Models

41. Domain 5

42. Multilabels-Based Scalable Access Control for Big Data Applications

43. A flexible hierarchical access control mechanism enforcing extension policies

44. Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme

45. VIRTUAL LEARNING IN NIGERIAN UNIVERSITIES

46. Group-Based Discretionary Access Control in Health Related Repositories

47. Study on Access Control Based on Trusted Computing

48. The Study of Access Mechanism for the Security of Linux

49. Design and Implementation of Role and Group Based Access Control with Context in Document Access Control System

50. Risk Assessment for Identifying Intrusion in Manet

Catalog

Books, media, physical & digital resources