Search

Your search keyword '"Authorization"' showing total 11,378 results

Search Constraints

Start Over You searched for: Descriptor "Authorization" Remove constraint Descriptor: "Authorization"
11,378 results on '"Authorization"'

Search Results

101. Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry

106. Attribute-Based Access Control Policy Review in Permissioned Blockchain

107. Granularity and Usability in Authorization Policies

108. Rethinking Access Control Mechanism for Ubiquitous Computing

111. The Challenges of Prosumers

112. Temporary Imprisonment Sentence for the Debtor Claiming Insolvency from the Perspective of Iranian Jurisprudence and Law

113. Temporary Imprisonment Sentence for the Debtor Claiming Insolvency from the Perspective of Iranian Jurisprudence and Law

114. THE PROBLEM OF ACCESS TO PRIVATELY OWNED LANDS DURING THE EXERCISE OF THE RIGHT TO HUNTING

115. A Privacy-Preserving System Design for Digital Presence Protection.

116. DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices.

117. Access Control Design Practice and Solutions in Cloud-Native Architecture: A Systematic Mapping Study.

118. Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History.

119. Regulatory Requirements for Exporting Cosmetic Products to Extra-EU Countries.

120. NACDA: Naming-Based Access Control and Decentralized Authorization for Secure Many-to-Many Data Sharing.

121. DAuth—Delegated Authorization Framework for Secured Serverless Cloud Computing.

122. Procedura de autorizare a medicamentelor din plante medicinale cu utilizare tradiţională.

123. A Role-Attribute Based Access Control Model for Dynamic Access Control in Hadoop Ecosystem.

124. Authentication and Authorization of Users and Services in Dynamic Military SOA Environments

125. Blockchain-based cross-domain authorization system for user-centric resource sharing

126. President’s Power, Transition, and Good Governance

127. Characteristics of a resolution authorizing an executive body of a local self-government unit to amend a budget in order to implement tasks related to assistance to Ukrainian citizens in connection with an armed conflict

128. Autorizarea produselor medicinale veterinar în contextul noilor reglementari Europene / nationale

129. SST v1.0.0 with C API: Pluggable security solution for the Internet of Things

130. Access Control for IoT: A Survey of Existing Research, Dynamic Policies and Future Directions.

131. A Secure and Decentralized Authentication Mechanism Based on Web 3.0 and Ethereum Blockchain Technology.

132. A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services.

133. Data and Service Security of GNSS Sensors Integrated with Cryptographic Module.

134. Pandemic, Hoaxes and Information Security of Kazakhstan.

135. Multi-Layer Token Framework for Data Protection in Cloud Computing.

136. Michał Głowiński w rozmowie o Kręgach obcości.

137. Authentication and Authorization in Modern Web Apps for Data Security Using Nodejs and Role of Dark Web.

138. FORENSIC FEATURES OF CYBERCRIME.

140. The Role of Regulator-Imposed Post-Approval Studies in Health Technology Assessments for Conditionally Approved Drugs

141. IPTV Access Methods with RADIUS-Server Authorization

142. Handling Meta Attribute Information in Usage Control Policies (Short Paper)

143. Temporal Authorization Graphs: Pros, Cons and Limits

144. Layered Architecture for End-To-End Security, Trust, and Privacy for the Internet of Things

146. IoT Honeypot Scanning and Detection System Based on Authorization Mechanism

147. Cybersecurity Specialists’ E-learning Problems

148. Application of Rules and Authorization Key for Secured Online Training—A Survey

149. Instinctive and Effective Authorization for Internet of Things

150. ARCSECURE: Centralized Hub for Securing a Network of IoT Devices

Catalog

Books, media, physical & digital resources