Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Access control")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 4385

  • Page / 176
Export

Selection :

  • and

DRM 2002 : digital rights management (Washington DC, 18 November 2002, revised papers)Feigenham, Joan.Lecture notes in computer science. 2003, issn 0302-9743, isbn 3-540-40410-4, X, 220 p, isbn 3-540-40410-4Conference Proceedings

Architecting a Cloud-Scale Identity Fabric : CLOUD COMPUTINGOLDEN, Eric.Computer (Long Beach, CA). 2011, Vol 44, Num 3, pp 52-59, issn 0018-9162, 8 p.Article

Administration model for Or-BACCUPPENS, Frédéric; MIEGE, Alexandre.Lecture notes in computer science. 2003, pp 754-768, issn 0302-9743, isbn 3-540-20494-6, 15 p.Conference Paper

Cryptographic implementation of dynamic access control in user hierarchyTZONG-CHEN WU.International journal of information and management sciences. 1994, Vol 5, Num 2, pp 73-85, issn 1017-1819Article

Protecting networks by controlling accessORTIZ, Sixto.Computer (Long Beach, CA). 2007, Vol 40, Num 8, pp 16-19, issn 0018-9162, 4 p.Article

Access control in collaborative systemsTOLONE, William; AHN, Gail-Joon; PAI, Tanusree et al.ACM computing surveys. 2005, Vol 37, Num 1, pp 29-41, issn 0360-0300, 13 p.Article

Efficient provably-secure hierarchical key assignment schemesDE SANTIS, Alfredo; FERRARA, Anna Lisa; MASUCCI, Barbara et al.Theoretical computer science. 2011, Vol 412, Num 41, pp 5684-5699, issn 0304-3975, 16 p.Article

New constructions for provably-secure time-bound hierarchical key assignment schemesDE SANTIS, Alfredo; FERRARA, Anna Lisa; MASUCCI, Barbara et al.Theoretical computer science. 2008, Vol 407, Num 1-3, pp 213-230, issn 0304-3975, 18 p.Article

The design of integrating subliminal channel with access controlLEE, Narn-Yih; YANG, Shu-Ya.Applied mathematics and computation. 2005, Vol 171, Num 1, pp 573-580, issn 0096-3003, 8 p.Article

Capability-based egress network access control by using DNS server : Information technologySUZUKI, Shinichi; SHINJO, Yasushi; HIROTSU, Toshio et al.Journal of network and computer applications. 2007, Vol 30, Num 4, pp 1275-1282, issn 1084-8045, 8 p.Conference Paper

A policy-based authorization model for workflow-enabled dynamic process managementJIAN CAO; JINJUN CHEN; HAIYAN ZHAO et al.Journal of network and computer applications. 2009, Vol 32, Num 2, pp 412-422, issn 1084-8045, 11 p.Conference Paper

Access control in mobile ambient calculi : A comparative viewMARGARIA, Ines; ZACCHI, Maddalena.Theoretical computer science. 2008, Vol 398, Num 1-3, pp 183-202, issn 0304-3975, 20 p.Article

A Generalized Temporal role-based access control modelJOSHI, James B. D; BERTINO, Elisa; LATIF, Usman et al.IEEE transactions on knowledge and data engineering. 2005, Vol 17, Num 1, pp 4-23, issn 1041-4347, 20 p.Article

Secure access of products in a process environmentCHOU, Shih-Chien; LAI, Chia-Wei.IEICE transactions on information and systems. 2005, Vol 88, Num 2, pp 197-203, issn 0916-8532, 7 p.Article

CAC with Nonlinearly-Constrained Feasibility RegionsCELLO, Marco; GNECCO, Giorgio; MARCHESE, Mario et al.IEEE communications letters. 2011, Vol 15, Num 4, pp 467-469, issn 1089-7798, 3 p.Article

Solutions NAC de contrôle d'accès au réseau = Network Access Control solutionsCHARLOT, Cécilien.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2008, Vol SI2, Num H5845, issn 1953-4663, H5845.1-H5845.9Article

An integrated approach to federated identity and privilege management in open systemsBHATTI, Rafae; BERTINO, Elisa; GHAFOOR, Arif et al.Communications of the ACM. 2007, Vol 50, Num 2, pp 81-87, issn 0001-0782, 7 p.Article

Implementing an access control system for SVG documentsFERNANDEZ-MEDINA, E; RUIZ, G; DE CAPITANI DI VIMERCATI, S et al.Lecture notes in computer science. 2003, pp 741-753, issn 0302-9743, isbn 3-540-20494-6, 13 p.Conference Paper

Distributed access control: A logic-based approachBARKER, Steve.Lecture notes in computer science. 2003, pp 217-228, issn 0302-9743, isbn 3-540-40797-9, 12 p.Conference Paper

Modified Chang-Hwang-Wu access control schemeHWANG, M.-S; YANG, W.-P; CHANG, C.-C et al.Electronics Letters. 1993, Vol 29, Num 24, pp 2095-2096, issn 0013-5194Article

SoNeUCONABC, an expressive usage control model for Web-Based Social NetworksGONZALEZ-MANZANO, Lorena; GONZALEZ-TABLAS, Ana I; DE FUENTES, José M et al.Computers & security. 2014, Vol 43, pp 159-187, issn 0167-4048, 29 p.Article

Design and analysis of DBMAC, an error localizing message authentication codeDI CRESCENZO, Giovanni; RENWEI GE; ARCE, Gonzalo R et al.IEEE Global Telecommunications Conference. 2004, pp 2224-2228, isbn 0-7803-8794-5, 5 p.Conference Paper

Comparing logic-based and XML-based rights expression languagesCHEUN NGEN CHONG; ETALLE, Sandro; HARTEL, Pieter H et al.Lecture notes in computer science. 2003, pp 779-792, issn 0302-9743, isbn 3-540-20494-6, 14 p.Conference Paper

Contractual access control. DiscussionFIROZABADI, Babak Sadighi; SERGOT, Marek; CHRISTIANSON, Bruce et al.Lecture notes in computer science. 2003, pp 96-103, issn 0302-9743, isbn 3-540-20830-5, 8 p.Conference Paper

iPhone forensics based on Macintosh open source and freeware toolsHÖNE, Thomas; CREUTZBURG, Reiner.Proceedings of SPIE, the International Society for Optical Engineering. 2011, Vol 7881, issn 0277-786X, isbn 978-0-8194-8418-5, 78810P.1-78810P.12Conference Paper

  • Page / 176