Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Contrôle accès")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 4342

  • Page / 174
Export

Selection :

  • and

Cryptographic implementation of dynamic access control in user hierarchyTZONG-CHEN WU.International journal of information and management sciences. 1994, Vol 5, Num 2, pp 73-85, issn 1017-1819Article

Policy administration domainsHITCHENS, M; VARADHARAJAN, Vijay; SAUNDERS, G et al.Lecture notes in computer science. 2002, pp 286-302, issn 0302-9743, isbn 3-540-43861-0, 17 p.Conference Paper

DRM 2002 : digital rights management (Washington DC, 18 November 2002, revised papers)Feigenham, Joan.Lecture notes in computer science. 2003, issn 0302-9743, isbn 3-540-40410-4, X, 220 p, isbn 3-540-40410-4Conference Proceedings

Architecting a Cloud-Scale Identity Fabric : CLOUD COMPUTINGOLDEN, Eric.Computer (Long Beach, CA). 2011, Vol 44, Num 3, pp 52-59, issn 0018-9162, 8 p.Article

Access control with single-key-lockMENG-LIH WU; TAI-YANG HWANG.IEEE transactions on software engineering. 1984, Vol 10, Num 2, pp 185-191, issn 0098-5589Article

Administration model for Or-BACCUPPENS, Frédéric; MIEGE, Alexandre.Lecture notes in computer science. 2003, pp 754-768, issn 0302-9743, isbn 3-540-20494-6, 15 p.Conference Paper

Protecting networks by controlling accessORTIZ, Sixto.Computer (Long Beach, CA). 2007, Vol 40, Num 8, pp 16-19, issn 0018-9162, 4 p.Article

Large homogeneous communication networks with Markovian access control. I: Equilibria and local stabilityCICERO, J; MEERKOV, S. M.Journal of mathematical analysis and applications. 1984, Vol 103, Num 2, pp 481-496, issn 0022-247XArticle

Une nouvelle catégorie de carte d'identification: les porte-clés de contrôle d'accès = A new type of identification card: the master keys of access controlGUILLOU, L.Onde électrique. 1984, Vol 64, Num 1, pp 24-27, issn 0030-2430Article

Techniques de contrôle d'accès à haut débit basées sur l'ATM pour les applications multimédia = High-Performance MAC Protocols Based on ATM for MultimediaJiang, Shengming; Pujolle, Guy.1995, 152 p.Thesis

The consistency of an access Control ListLI, Shou-Peng; WU, Shi-Zhong; TAO GUO et al.Lecture notes in computer science. 2002, pp 367-373, issn 0302-9743, isbn 3-540-00164-6, 7 p.Conference Paper

CAC with Nonlinearly-Constrained Feasibility RegionsCELLO, Marco; GNECCO, Giorgio; MARCHESE, Mario et al.IEEE communications letters. 2011, Vol 15, Num 4, pp 467-469, issn 1089-7798, 3 p.Article

Solutions NAC de contrôle d'accès au réseau = Network Access Control solutionsCHARLOT, Cécilien.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2008, Vol SI2, Num H5845, issn 1953-4663, H5845.1-H5845.9Article

An integrated approach to federated identity and privilege management in open systemsBHATTI, Rafae; BERTINO, Elisa; GHAFOOR, Arif et al.Communications of the ACM. 2007, Vol 50, Num 2, pp 81-87, issn 0001-0782, 7 p.Article

Implementing an access control system for SVG documentsFERNANDEZ-MEDINA, E; RUIZ, G; DE CAPITANI DI VIMERCATI, S et al.Lecture notes in computer science. 2003, pp 741-753, issn 0302-9743, isbn 3-540-20494-6, 13 p.Conference Paper

Distributed access control: A logic-based approachBARKER, Steve.Lecture notes in computer science. 2003, pp 217-228, issn 0302-9743, isbn 3-540-40797-9, 12 p.Conference Paper

Modified Chang-Hwang-Wu access control schemeHWANG, M.-S; YANG, W.-P; CHANG, C.-C et al.Electronics Letters. 1993, Vol 29, Num 24, pp 2095-2096, issn 0013-5194Article

Design and analysis of DBMAC, an error localizing message authentication codeDI CRESCENZO, Giovanni; RENWEI GE; ARCE, Gonzalo R et al.IEEE Global Telecommunications Conference. 2004, pp 2224-2228, isbn 0-7803-8794-5, 5 p.Conference Paper

Comparing logic-based and XML-based rights expression languagesCHEUN NGEN CHONG; ETALLE, Sandro; HARTEL, Pieter H et al.Lecture notes in computer science. 2003, pp 779-792, issn 0302-9743, isbn 3-540-20494-6, 14 p.Conference Paper

Contractual access control. DiscussionFIROZABADI, Babak Sadighi; SERGOT, Marek; CHRISTIANSON, Bruce et al.Lecture notes in computer science. 2003, pp 96-103, issn 0302-9743, isbn 3-540-20830-5, 8 p.Conference Paper

A parallel MAC architecture for a Gigabit/s DQDB MAN suitable for multimedia applicationsCASALE, S; LA CORTE, A.European transactions on telecommunications. 1996, Vol 7, Num 6, pp 541-551, issn 1124-318XArticle

iPhone forensics based on Macintosh open source and freeware toolsHÖNE, Thomas; CREUTZBURG, Reiner.Proceedings of SPIE, the International Society for Optical Engineering. 2011, Vol 7881, issn 0277-786X, isbn 978-0-8194-8418-5, 78810P.1-78810P.12Conference Paper

Identity managementTHOMPSON, Craig W; THOMPSON, Dale R.IEEE internet computing. 2007, Vol 11, Num 3, pp 82-85, issn 1089-7801, 4 p.Article

A typed encoding of boxed into safe ambientsLEVI, Francesca.Acta informatica. 2006, Vol 42, Num 6-7, pp 429-500, issn 0001-5903, 72 p.Article

Tile-based transport of JPEG 2000 imagesGORMISH, Michael; BANERJEE, Serene.Lecture notes in computer science. 2003, pp 217-224, issn 0302-9743, isbn 3-540-20081-9, 8 p.Conference Paper

  • Page / 174