Search

Your search keyword '"Extended Access Control"' showing total 84 results

Search Constraints

Start Over You searched for: Descriptor "Extended Access Control" Remove constraint Descriptor: "Extended Access Control"
84 results on '"Extended Access Control"'

Search Results

2. An extended access control model for permissioned blockchain frameworks

3. PREVENTING IDENTITY FRAUD BY USING BIOMETRIC CONTROL SYSTEM SECURITY MECHANISMS.

4. Towards a more secure and scalable verifying PKI of eMRTD.

5. Implementation of security and privacy in ePassports and the extended access control infrastructure.

6. Security Fault Tolerance for Access Control

7. Attribute-based Fine-grained Extended Access Control Mechanism for Online Social Networks

8. An extended access control mechanism exploiting data dependencies

10. Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things

11. Risk adaptive hybrid RFID access control system

12. Implementation of security and privacy in ePassports and the extended access control infrastructure

13. RFID Based Security and Access Control System

14. Zero Round-Trip Time for the Extended Access Control Protocol

15. PRF-ODH: Relations, Instantiations, and Impossibility Results

16. Risk assessment based access control with text and behavior analysis for document management

17. Identification system testing and optimisation

18. A survey of system security in contactless electronic passports

19. E-passport EAC scheme based on Identity-Based Cryptography

20. Supporting Complex Access Control Policy in PDM System

21. Electronic passports – from secure specifications to secure implementations

22. A secure and flexible e-Health access control system with provisions for emergency access overrides and delegation of access privileges

23. Attribute-Based Access Control Architectures with the eIDAS Protocols

24. Physical Access Control for Captured RFID Data

25. An information flow control model for C applications based on access control lists

26. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

27. A policy-driven approach to access control in future internet name resolution services

28. An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system

29. Controlling aggregation in distributed object systems: a graph-based approach

30. Towards a More Secure and Scalable Verifying PKI of eMRTD

31. Development of RFID EPC Gen2 Tag for Multi Access Control System

32. Protecting Outsourced Data Privacy with Lifelong Policy Carrying

33. Implementing graceful RFID privilege reduction

34. Authentication and authorization: Domain specific Role Based Access Control using Ontology

35. A location sensitive access control system

36. Sensory-data-enhanced authentication for RFID-based access control systems

37. Efficient authorized access security system control using ATMEL 89C55 & mobile bluetooth

38. Introduction and Overview

39. Access control and security for a distributed control system

40. Access control: principle and practice

41. Security architecture for distributed systems

42. Making distributed multimedia systems secure

43. Role-based integrated access control and data provenance for SOA based net-centric systems

44. Securely and Flexibly Sharing a Biomedical Data Management System

45. Authorization and Access Control

46. Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents

47. Cryptography based access control in healthcare web systems

48. Securing RFID-based authentication systems using ParseKey+

49. The Application of RBAC in Digital Rights Management System

50. Modular context-aware access control for medical sensor networks

Catalog

Books, media, physical & digital resources