Search

Your search keyword '"Extended Access Control"' showing total 65 results

Search Constraints

Start Over You searched for: Descriptor "Extended Access Control" Remove constraint Descriptor: "Extended Access Control" Topic computer.software_genre Remove constraint Topic: computer.software_genre
65 results on '"Extended Access Control"'

Search Results

1. An extended access control model for permissioned blockchain frameworks

2. Security Fault Tolerance for Access Control

3. Attribute-based Fine-grained Extended Access Control Mechanism for Online Social Networks

4. An extended access control mechanism exploiting data dependencies

5. Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things

6. Implementation of security and privacy in ePassports and the extended access control infrastructure

7. RFID Based Security and Access Control System

8. Risk assessment based access control with text and behavior analysis for document management

9. Identification system testing and optimisation

10. A survey of system security in contactless electronic passports

11. E-passport EAC scheme based on Identity-Based Cryptography

12. Electronic passports – from secure specifications to secure implementations

13. A secure and flexible e-Health access control system with provisions for emergency access overrides and delegation of access privileges

14. Attribute-Based Access Control Architectures with the eIDAS Protocols

15. Physical Access Control for Captured RFID Data

16. An information flow control model for C applications based on access control lists

17. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

18. A policy-driven approach to access control in future internet name resolution services

19. An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system

20. Towards a More Secure and Scalable Verifying PKI of eMRTD

21. Development of RFID EPC Gen2 Tag for Multi Access Control System

22. Protecting Outsourced Data Privacy with Lifelong Policy Carrying

23. Implementing graceful RFID privilege reduction

24. Authentication and authorization: Domain specific Role Based Access Control using Ontology

25. A location sensitive access control system

26. Sensory-data-enhanced authentication for RFID-based access control systems

27. Efficient authorized access security system control using ATMEL 89C55 & mobile bluetooth

28. Introduction and Overview

29. Access control and security for a distributed control system

30. Access control: principle and practice

31. Security architecture for distributed systems

32. Making distributed multimedia systems secure

33. Role-based integrated access control and data provenance for SOA based net-centric systems

34. Securely and Flexibly Sharing a Biomedical Data Management System

35. Authorization and Access Control

36. Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents

37. Cryptography based access control in healthcare web systems

38. Securing RFID-based authentication systems using ParseKey+

39. The Application of RBAC in Digital Rights Management System

40. Modular context-aware access control for medical sensor networks

41. Iris based authentication mechanism for e-Passports

42. Domain 2

43. Three-Layers Role-Based Access Control Framework in Large Financial Web Systems

44. An Overview of Electronic Passport Security Features

45. Applying Context-Aware RBAC to RFID Security Management for Application in Retail Business

46. Access Control of RFID Middleware Using Extended Usage Control Model

47. An Extended Access Control Model Based on Role and Department

48. Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement Protocol

49. Rewrite Based Specification of Access Control Policies

50. An On-Line Secure E-Passport Protocol

Catalog

Books, media, physical & digital resources