Search

Your search keyword '"access-control"' showing total 30 results

Search Constraints

Start Over You searched for: Descriptor "access-control" Remove constraint Descriptor: "access-control"
30 results on '"access-control"'

Search Results

1. Implementing Access-Controlled Footpaths in Urban Roads with Consideration for Universal Design Principals

2. Protection of Bio-resources and Associated Knowledge against Bio-Piracy: A Critical Appraisal of Access-Control Mechanism in Biodiversity Management

3. Securi-Chain: Enhancing Smart Contract Security in Blockchain Systems Through Optimized Access Control.

4. Modeling and enforcing access control policies in conversational user interfaces.

5. AuthCheck: Program-State Analysis for Access-Control Vulnerabilities

6. Achieving resource-centric access control for web-app interactions on android

7. Evaluation of a policy enforcement solution in telemedicine with offline use cases.

8. TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud

9. A Metamodel of the B Modeling of Access-Control Policies: Work in Progress

11. Generalized Access Control of Synchronous Communication

12. Health information systems (HIS) privacy restrictions for GDPR: Assessing initial impacts perceived by patients and healthcare professionals

14. Attribute-based credentials with cryptographic collusion prevention.

16. A Survey on Blockchain-based IoMT Systems: Towards Scalability

17. Data Safety Policy Considerations in Educational Information Management Systems.

18. Privacy Models in Wireless Sensor Networks: A Survey

19. BOUNCER: Privacy-aware Query Processing Over Federations of RDF Datasets

20. BOUNCER: Privacy-aware Query Processing Over Federations of RDF Datasets

21. The Survey on Near Field Communication

22. ase-PoW: a proof of ownership mechanism for cloud deduplication in hierarchical environments

23. Model-based Analysis of Java EE Web Security Configurations

24. Formal Firewall Conformance Testing: An Application of Test and Proof Techniques

25. Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems

26. Automatic reconstruction and analysis of security policies from deployed security components

27. A Secure Non-monotonic Soft Concurrent Constraint Language

28. On Formal Specification and Analysis of Security Policies

29. Formal Modeling and Verification of Access-Control Policies

30. Re-authentication of Critical Operations

Catalog

Books, media, physical & digital resources