Search

Your search keyword '"Discretionary access control"' showing total 597 results

Search Constraints

Start Over You searched for: Descriptor "Discretionary access control" Remove constraint Descriptor: "Discretionary access control"
597 results on '"Discretionary access control"'

Search Results

1. Secure Trusted Operating System Based on Microkernel Architecture

4. A flexible fine-grained dynamic access control approach for cloud computing environment.

5. Introduction

6. Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control

7. Discretionary Information Flow Control for Interaction-Oriented Specifications

8. Design Patterns for Multiple Stakeholders in Social Computing

9. Controlling Data Dissemination

11. Web Application Security Gateway with Java Non-blocking IO

12. Covering Based Granular Computing for Conflict Analysis

13. A Security Access Control Mechanism for a Multi-layer Heterogeneous Storage Structure

15. A Novel Approach to Role-Based Access Control

16. An extended access control mechanism exploiting data dependencies.

22. KDP scheme of preliminary key distribution in discretionary security policy.

23. Secure Trusted Operating System Based on Microkernel Architecture

24. Solid over the Interplanetary File System

25. A Scalable Role Mining Approach for Large Organizations

26. A safe architecture for authorisation grant in healthcare ecosystems

27. Blockchain Platforms and Access Control Classification for IoT Systems

28. Modeling Transformations of Information Links in the Cybersecurity Architecture of Systems Using Algorithms on Graphs and the 'Take-Grant' Formal Model

29. Strengthen Electronic Health Records System (EHR-S) Access-Control to Cope with GDPR Explicit Consent

30. Developing and Assessing an Educational Game for Teaching Access Control

31. A Model-Driven Framework for Ensuring Role Based Access Control in IoT Devices

32. Remote Access Control Model for MQTT Protocol

33. Exploring the Access Control Policies of Web-Based Social Network

34. An Adaptation of Context and Trust Aware Workflow Oriented Access Control for Remote Healthcare

35. Multi-user permission strategy to access sensitive information

36. Interleaving tasks to improve performance: Users maximise the marginal rate of return

37. The Comparative Analysis of Main Access Control Technologies.

38. Combining Discretionary Policy with Mandatory Information Flow in Operating Systems.

40. Practical Role-Based Access Control.

41. A theory for comparing the expressive power of access control models.

42. A trusted access method in software-defined network

43. Current Research and Open Problems in Attribute-Based Access Control

44. Designing Application Permission Models that Meet User Expectations

45. Database security - concepts, approaches, and challenges.

46. On the Feasibility of Attribute-Based Access Control Policy Mining

47. Towards Integrating Attribute-Based Access Control into Ontologies

48. From Access Control Models to Access Control Metamodels: A Survey

49. The Design and Implementation of a Linux Kernel Module for File Descriptor Revocation

50. Effective Security and Access Control Framework for Multilevel Organizations

Catalog

Books, media, physical & digital resources