Search

Your search keyword '"Authorization"' showing total 11,378 results

Search Constraints

Start Over You searched for: Descriptor "Authorization" Remove constraint Descriptor: "Authorization"
11,378 results on '"Authorization"'

Search Results

1. Guide to Attribute Based Access Control (ABAC) definition and considerations

3. Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home

4. Hierarchical password capabilities.

5. Authority and Evaluation as Strategies of Legitimization in Trump's Public Speeches.

6. Telemedicine in Italy: Healthcare authorization profiles in the modern medico-legal reading.

7. Cloud-Based Access Control Including Time and Location.

8. TAŞINMAZ SATIŞ SÖZLEŞMELERİNİN NOTERLERDE DÜZENLENMESİ.

9. The access control double bind: How everyday interfaces regulate access and privacy, enable surveillance, and enforce identity.

10. THE PROPORTIONALITY OF RESTRICTING FUNDAMENTAL RIGHTS AND FREEDOMS TO THE PERFORMANCE OF SOME EVIDENTIARY PROCEEDINGS.

11. Handling Complexity in Decentralized Research Networks: The Data Sharing Framework Allowlist Management Application.

13. Authentication and Authorization Frameworks for IoT

14. USB Fort Knox: Building a Robust Defense Against Data Breaches

15. Authorization Model for Microservice-Based ERP Software

16. Automatic Directory Service Integration in Distributed Firewall Resources: A Study of Scripting and LDAP Integration with pfSense

19. AuthApp – Portable, Reusable Solid App for GDPR-Compliant Access Granting

23. Interactive Learning for Patient Care: Blockchain Ingrained Electronic Health Record Management System with Patient Control, Data Quality and Security Assurance

24. Authentication, Authorization, Administration and Audit Impact on Digital Security

25. A Survey on Security in Data Transmission in IoT: Layered Architecture

26. An efficient framework for authentication and blockchain authorization of secured healthcare information using hpcsg- rotdf-slorb and dhsk-decc.

27. Canadians' use of cannabis for therapeutic purposes since legalization of recreational cannabis: a cross-sectional analysis by medical authorization status.

28. Secure Data Aggregation Using Authentication and Authorization for Privacy Preservation in Wireless Sensor Networks.

29. Monopolul de stat în industria jocurilor de noroc și tratamentul egal între operatorii privați și cei deținuți de stat.

30. LAS SOCIEDADES POR ACCIONES SIMPLIFICADAS. NECESIDAD DE SU REGULACIÓN EN EL DERECHO SOCIETARIO CUBANO.

31. Reclamation and Authorization: Cepollaro and Lopez de Sa on in-group Restriction.

32. Blockchain Solutions for Authorization and Authentication.

33. 基于双层链的个人隐私数据保护和授权框架.

34. Outsourcing or Authorizing? Optimal Options for Third-Party Remanufacturing Modes with Green Consumerism.

35. Dataset for authentication and authorization using physical layer properties in indoor environment

36. Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach

37. FPRESSO: Fast and Privacy-Preserving SSO Authentication With Dynamic Load Balancing for Multi-Cloud-Based Web Applications

38. SAAC: Secure Access Control Management Framework for Multi-User Smart Home Systems

39. Ephemeral Secret Leakage-Free ID-Role-Based Access Control Authentication and Key Exchange Protocol for Securing Electric Vehicle Data

40. Protecting Your Online Persona: A Preferential Selective Encryption Approach for Enhanced Privacy in Tweets, Images, Memes, and Metadata

41. Blockchain-Based Authorization Mechanism for Educational Social Internet of Things

42. Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach.

43. Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records.

44. РОЗРОБКА ПРОГРАМНОГО ЗАСТОСУНКУ ДЛЯ БІОМЕТРИЧНОЇ ІДЕНТИФІКАЦІЇ КОРИСТУВАЧА ЗА СТИЛЕМ НАБОРУ НА КЛАВІАТУРІ

45. User Name-Based Compression and Encryption of Images Using Chaotic Compressive Sensing Theory.

46. Privacy preserving content distribution framework for multidistributor DRM systems.

47. Analysis of the Impact of Billing, Authorizations and Unknown Debts on the Technical Reserve of Health Promotion Companies: Case of HPC in Colombia.

48. АНАЛІЗ ВИКОРИСТАННЯ ЙМОВІРНІСНИХ ФІЛЬТРІВ ДЛЯ ІНВАЛІДАЦІЇ ТОКЕНІВ АВТЕНТИФІКАЦІЇ У РОЗПОДІЛЕНИХ СИСТЕМАХ

49. A systematic literature review of authorization and access control requirements and current state of the art for different database models.

50. СТРАТЕГІЇ ТА ІННОВАЦІЙНІ ПІДХОДИ ДО ЗАХИСТУ БАЗ ДАНИХ В ЕПОХУ ЗРОСТАЮЧИХ КІБЕРЗАГРОЗ.

Catalog

Books, media, physical & digital resources