kw.\*:("Access control")
Results 1 to 25 of 4385
Selection :
DRM 2002 : digital rights management (Washington DC, 18 November 2002, revised papers)Feigenham, Joan.Lecture notes in computer science. 2003, issn 0302-9743, isbn 3-540-40410-4, X, 220 p, isbn 3-540-40410-4Conference Proceedings
Architecting a Cloud-Scale Identity Fabric : CLOUD COMPUTINGOLDEN, Eric.Computer (Long Beach, CA). 2011, Vol 44, Num 3, pp 52-59, issn 0018-9162, 8 p.Article
Administration model for Or-BACCUPPENS, Frédéric; MIEGE, Alexandre.Lecture notes in computer science. 2003, pp 754-768, issn 0302-9743, isbn 3-540-20494-6, 15 p.Conference Paper
Cryptographic implementation of dynamic access control in user hierarchyTZONG-CHEN WU.International journal of information and management sciences. 1994, Vol 5, Num 2, pp 73-85, issn 1017-1819Article
Protecting networks by controlling accessORTIZ, Sixto.Computer (Long Beach, CA). 2007, Vol 40, Num 8, pp 16-19, issn 0018-9162, 4 p.Article
Access control in collaborative systemsTOLONE, William; AHN, Gail-Joon; PAI, Tanusree et al.ACM computing surveys. 2005, Vol 37, Num 1, pp 29-41, issn 0360-0300, 13 p.Article
Efficient provably-secure hierarchical key assignment schemesDE SANTIS, Alfredo; FERRARA, Anna Lisa; MASUCCI, Barbara et al.Theoretical computer science. 2011, Vol 412, Num 41, pp 5684-5699, issn 0304-3975, 16 p.Article
New constructions for provably-secure time-bound hierarchical key assignment schemesDE SANTIS, Alfredo; FERRARA, Anna Lisa; MASUCCI, Barbara et al.Theoretical computer science. 2008, Vol 407, Num 1-3, pp 213-230, issn 0304-3975, 18 p.Article
The design of integrating subliminal channel with access controlLEE, Narn-Yih; YANG, Shu-Ya.Applied mathematics and computation. 2005, Vol 171, Num 1, pp 573-580, issn 0096-3003, 8 p.Article
Capability-based egress network access control by using DNS server : Information technologySUZUKI, Shinichi; SHINJO, Yasushi; HIROTSU, Toshio et al.Journal of network and computer applications. 2007, Vol 30, Num 4, pp 1275-1282, issn 1084-8045, 8 p.Conference Paper
A policy-based authorization model for workflow-enabled dynamic process managementJIAN CAO; JINJUN CHEN; HAIYAN ZHAO et al.Journal of network and computer applications. 2009, Vol 32, Num 2, pp 412-422, issn 1084-8045, 11 p.Conference Paper
Access control in mobile ambient calculi : A comparative viewMARGARIA, Ines; ZACCHI, Maddalena.Theoretical computer science. 2008, Vol 398, Num 1-3, pp 183-202, issn 0304-3975, 20 p.Article
A Generalized Temporal role-based access control modelJOSHI, James B. D; BERTINO, Elisa; LATIF, Usman et al.IEEE transactions on knowledge and data engineering. 2005, Vol 17, Num 1, pp 4-23, issn 1041-4347, 20 p.Article
Secure access of products in a process environmentCHOU, Shih-Chien; LAI, Chia-Wei.IEICE transactions on information and systems. 2005, Vol 88, Num 2, pp 197-203, issn 0916-8532, 7 p.Article
CAC with Nonlinearly-Constrained Feasibility RegionsCELLO, Marco; GNECCO, Giorgio; MARCHESE, Mario et al.IEEE communications letters. 2011, Vol 15, Num 4, pp 467-469, issn 1089-7798, 3 p.Article
Solutions NAC de contrôle d'accès au réseau = Network Access Control solutionsCHARLOT, Cécilien.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2008, Vol SI2, Num H5845, issn 1953-4663, H5845.1-H5845.9Article
An integrated approach to federated identity and privilege management in open systemsBHATTI, Rafae; BERTINO, Elisa; GHAFOOR, Arif et al.Communications of the ACM. 2007, Vol 50, Num 2, pp 81-87, issn 0001-0782, 7 p.Article
Implementing an access control system for SVG documentsFERNANDEZ-MEDINA, E; RUIZ, G; DE CAPITANI DI VIMERCATI, S et al.Lecture notes in computer science. 2003, pp 741-753, issn 0302-9743, isbn 3-540-20494-6, 13 p.Conference Paper
Distributed access control: A logic-based approachBARKER, Steve.Lecture notes in computer science. 2003, pp 217-228, issn 0302-9743, isbn 3-540-40797-9, 12 p.Conference Paper
Modified Chang-Hwang-Wu access control schemeHWANG, M.-S; YANG, W.-P; CHANG, C.-C et al.Electronics Letters. 1993, Vol 29, Num 24, pp 2095-2096, issn 0013-5194Article
SoNeUCONABC, an expressive usage control model for Web-Based Social NetworksGONZALEZ-MANZANO, Lorena; GONZALEZ-TABLAS, Ana I; DE FUENTES, José M et al.Computers & security. 2014, Vol 43, pp 159-187, issn 0167-4048, 29 p.Article
Design and analysis of DBMAC, an error localizing message authentication codeDI CRESCENZO, Giovanni; RENWEI GE; ARCE, Gonzalo R et al.IEEE Global Telecommunications Conference. 2004, pp 2224-2228, isbn 0-7803-8794-5, 5 p.Conference Paper
Comparing logic-based and XML-based rights expression languagesCHEUN NGEN CHONG; ETALLE, Sandro; HARTEL, Pieter H et al.Lecture notes in computer science. 2003, pp 779-792, issn 0302-9743, isbn 3-540-20494-6, 14 p.Conference Paper
Contractual access control. DiscussionFIROZABADI, Babak Sadighi; SERGOT, Marek; CHRISTIANSON, Bruce et al.Lecture notes in computer science. 2003, pp 96-103, issn 0302-9743, isbn 3-540-20830-5, 8 p.Conference Paper
iPhone forensics based on Macintosh open source and freeware toolsHÖNE, Thomas; CREUTZBURG, Reiner.Proceedings of SPIE, the International Society for Optical Engineering. 2011, Vol 7881, issn 0277-786X, isbn 978-0-8194-8418-5, 78810P.1-78810P.12Conference Paper