1,383 results on '"Barker, Steve"'
Search Results
102. Using The Delphi Technique To Establish A Robust Research Agenda For Remanufacturing
103. Coherent Design Rationale and its importance to the Remanufacturing Sector
104. Web Resource Usage Control in RSCLP
105. Picture this! making QWI results mean something to legislative leaders
106. Access Control with Privacy Enhancements: A Unified Approach
107. GPF: A General Policy Framework
108. Personalizing access control by generalizing access control
109. The next 700 access control models or a unifying meta-model?
110. Status-Based Access Control
111. Access control by action control
112. Action-status access control
113. Efficient and flexible access control via logic program specialisation
114. Flexible access control policy specification with constraint logic programming
115. Coherent Design Rationale and its importance to the Remanufacturing Sector.
116. Using The Delphi Technique To Establish A Robust Research Agenda For Remanufacturing.
117. XACML Policies for Exclusive Resource Usage.
118. Security Patterns for Physical Access Control Systems.
119. New Paradigm of Inference Control with Trusted Computing.
120. Towards a Times-Based Usage Control Model.
121. A Spatio-temporal Role-Based Access Control Model.
122. Dynamic Event-Based Access Control as Term Rewriting.
123. Design and Analysis of Querying Encrypted Data in Relational Databases.
124. gVault: A Gmail Based Cryptographic Network File System.
125. A Scalable and Secure Cryptographic Service.
126. A Privacy-Enhanced Attribute-Based Access Control System.
127. Enforcing Honesty in Assured Information Sharing Within a Distributed System.
128. Measuring the Overall Security of Network Configurations Using Attack Graphs.
129. Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.
130. Efficient Security Policy Enforcement in a Location Based Service Environment.
131. Location Privacy Protection Through Obfuscation-Based Techniques.
132. Authenticated Relational Tables and Authenticated Skip Lists.
133. Provably-Secure Schemes for Basic Query Support in Outsourced Databases.
134. Confidentiality Policies for Controlled Query Evaluation.
135. Term Rewriting for Access Control.
136. Efficient and flexible access control via logic program specialisation.
137. Organisational health: A framework for checking your organisation's fitness for success
138. Cellular Senescence After Single and Repeated Balloon Catheter Denudations of Rabbit Carotid Arteries
139. The Columns.
140. The Columns.
141. Peripheral nerve stimulation for trigeminal neuropathic pain.
142. Status-Based Access Control.
143. Science Fiction, Fantasy, and Horror Writers
144. Wilderness Preservation
145. Gay and Lesbian Rights
146. The Encyclopedia of the American Military
147. The Dictionary of Science
148. Environmental Hazards: Marine Pollution
149. Capital Punishment
150. Smithsonian Timelines of the Ancient World
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.