Search

Your search keyword '"Authorization"' showing total 12,188 results

Search Constraints

Start Over You searched for: Descriptor "Authorization" Remove constraint Descriptor: "Authorization"
12,188 results on '"Authorization"'

Search Results

201. DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology.

202. Pädagogiken auf Probe.

203. A novel role-mapping algorithm for enhancing highly collaborative access control system.

204. Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security.

205. Pädagogische Autorität.

206. Analysis of the unauthorized extraction of personal data from an IoT device.

207. A secure cross‐organizational container deployment approach to enable ad hoc collaborations.

208. Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem.

209. Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage.

210. Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata.

211. ABORDĂRI DOCTRINARE LA NIVEL NAȚIONAL ÎN MATERIA INSTRUMENTELOR JURIDICOFINANCIARE DE PROTECȚIE A MEDIULUI.

212. ANNPDP: An Efficient and Stable Evaluation Engine for Large-Scale Policy Sets.

213. CLASS ACTIONS IN QUEBEC: HIGHLIGHTS OF A UNIQUE PROCEDURE

214. Hybrid Role and Attribute Based Access Control Applied in Information Systems

215. Protejarea domiciliului în cadrul procedurilor de executare silită / Protection of Residence in Enforcement Proceedings

218. New genomic techniques and their European Union reform. Potential policy changes and their implications

219. INTEGRATION WITH THE SOFTWARE INTERFACE OF THE COM SERVER FOR AUTHORIZED USER

220. A Smart Image Encryption Technology via Applying Personal Information and Speaker-Verification System

221. MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications

222. Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History

223. Regulatory Requirements for Exporting Cosmetic Products to Extra-EU Countries

224. DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices

225. AI-assisted bio-inspired algorithm for secure IoT communication networks.

226. A Novel ES-RwCNN Based Finger Vein Recognition System with Effective L12 DTP Descriptor and AWM-WOA Selection.

227. Enhancing highly-collaborative access control system using a new role-mapping algorithm.

228. A novel authentication and authorization scheme in P2P networking using location-based privacy.

229. A Formal Approach for the Identification of Authorization Policy Conflicts within Multi-Cloud Environments.

230. Schloss: Blockchain-Based System Architecture for Secure Industrial IoT.

231. Novel Security Models for IoT–Fog–Cloud Architectures in a Real-World Environment.

232. iFaaSBus: A Security- and Privacy-Based Lightweight Framework for Serverless Computing Using IoT and Machine Learning.

233. The Role of Regulator-Imposed Post-Approval Studies in Health Technology Assessments for Conditionally Approved Drugs.

234. Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities.

235. Blockchain-Based Security Mechanisms for IoMT Edge Networks in IoMT-Based Healthcare Monitoring Systems.

236. Safety and efficacy of a feed additive consisting of Bacillus velezensis ATCC PTA‐6737 (Bacillus velezensis PB6) for turkeys for fattening, turkeys reared for breeding, laying hens, minor poultry species for laying, piglets (weaned), weaned minor porcine species and sows (Kemin Europe N.V.)

237. Group agency and the challenges of repairing historical injustice.

238. IPTV Access Methods with RADIUS-Server Authorization.

239. Charakterystyka uchwały upoważniającej organ wykonawczy jednostki samorządu terytorialnego do zmian w budżecie w celu realizacji zadań związanych z pomocą obywatelom Ukrainy w związku z konfliktem zbrojnym.

240. A Consortium Blockchain-Based Access Control Framework With Dynamic Orderer Node Selection for 5G-Enabled Industrial IoT.

241. New Enhanced Authentication Protocol for Internet of Things

242. Technical dossier and legal proceedings in Brazilian dimension stone mining

243. Design of EHR in Cloud with Security

244. A Study on the Rainbowchain Certificate in Order to Overcome Existing Certification System

247. Survey of Security Mechanisms in Internet of Things

248. Comprehensive Survey on Hadoop Security

249. Policy-Based Access Control Scheme for Securing Hadoop Ecosystem

250. Cloud in Mobile Platforms: Managing Authentication/Authorization

Catalog

Books, media, physical & digital resources