Search

Your search keyword '"Access control"' showing total 48,632 results

Search Constraints

Start Over You searched for: Descriptor "Access control" Remove constraint Descriptor: "Access control"
48,632 results on '"Access control"'

Search Results

1. Age Verification Systems Will Be a Personal Identifiable Information Nightmare.

2. Guide to Attribute Based Access Control (ABAC) definition and considerations

3. Smart Environments: Information Flow Control in Smart Grids

5. POP-HIT: Partially Order-Preserving Hash-Induced Transformation for Privacy Protection in Face Recognition Access Control

6. Enhancing Cross-Device Security with Fine-Grained Permission Control

8. An efficient texture descriptor based on local patterns and particle swarm optimization algorithm for face recognition.

9. Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications.

10. Business process discovery as a service with event log privacy and access control over discovered models.

11. Harnessing the amber waves: U.S. grain embargoes against the Soviet Union and the politics of insecurity, 1975–1980.

12. Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme.

13. A smart contract-driven access control scheme with integrity checking for electronic health records.

14. Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing.

15. Specifying and Verifying Information Flow Control in SELinux Configurations.

16. B-ERAC: BLOCKCHAIN-ENABLED ROLE-BASED ACCESS CONTROL FOR SECURE IOT DEVICE COMMUNICATION.

17. A DYNAMIC SANDBOX DETECTION TECHNIQUE IN A PRIVATE CLOUD ENVIRONMENT.

18. REVOLUTIONIZING CLOUD SECURITY: A NOVEL FRAMEWORK FOR ENHANCED DATA PROTECTION IN TRANSMISSION AND MIGRATION.

19. An optimized dynamic attribute-based searchable encryption scheme.

20. Nonmedical cannabis legalization policy in Canada: Has commercialization been a pivotal mistake for public health?

21. IPv6 addressing strategy with improved secure duplicate address detection to overcome denial of service and reconnaissance attacks.

22. A Fair MAC Protocol Based on Dual Bandwidth Allocation Iterations in Underwater Acoustic Sensor Networks.

23. Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applications.

24. We need to aim at the top: Factors associated with cybersecurity awareness of cyber and information security decision-makers.

25. Dynamic Twitter friend grouping based on similarity, interaction, and trust to account for ever‐evolving relationships.

26. An improved smart contract-based bring your own device (BYOD) security control framework.

27. A New Hybrid MAC Protocol for UAV-based Data Gathering in Dense IoT Network Applications.

28. Value of Dual Arterial Access for Improved Angiographic Control for Double-Lumen Arterial Balloon Onyx Embolization of Multifeeder Complex Cranial Dural Arteriovenous Fistulas: A Technical Nuance.

29. Attribute-Based Designated Combiner Transitive Signature Scheme.

30. Analyzing supply chain technology trends through network analysis and clustering techniques: a patent-based study.

31. Using the ACE framework to enforce access and usage control with notifications of revoked access rights.

32. Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs.

33. Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control.

34. StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control.

35. Assessing women's empowerment, participation, and engagement in aquaculture in Bangladesh.

36. BIoT Smart Switch-Embedded System Based on STM32 and Modbus RTU—Concept, Theory of Operation and Implementation.

37. Measuring Enterprise Resource Planning (ERP) Software Risk Management for Digital SMEs.

38. Comparative Assessment of Expected Safety Performance of Freeway Automated Vehicle Managed Lanes.

39. Voluntary self-exclusion from gambling: Expert opinions on gaps and needs for improvement.

40. Intelligent and Secure Cloud–Edge Collaborative Industrial Information Encryption Strategy Based on Credibility Assessment.

41. Adaptive MAC Scheme for Interference Management in Ad Hoc IoT Networks.

42. Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption.

43. Access Control Models and Frameworks for the IoT Environment: Review, Challenges, and Future Direction.

44. Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System.

45. Deploying artificial intelligence in services to AID vulnerable consumers.

46. Contextual attribute‐based access control scheme for cloud storage using blockchain technology.

47. CLAACS‐IOD: Certificate‐embedded lightweight authentication and access control scheme for Internet of Drones.

48. Enhanced Visual Cryptographic Schemes with Essential Access Structures and Pixel-Wise Operations.

49. Multi-Fusion Biometric Authentication using Minutiae-Driven Fixed-Size Template Matching (MFTM).

50. Modelling a Request and Response-Based Cryptographic Model For Executing Data Deduplication in the Cloud.

Catalog

Books, media, physical & digital resources