Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Contrôle accès")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 6388

  • Page / 256
Export

Selection :

  • and

Cryptographic implementation of dynamic access control in user hierarchyTZONG-CHEN WU.International journal of information and management sciences. 1994, Vol 5, Num 2, pp 73-85, issn 1017-1819Article

Policy administration domainsHITCHENS, M; VARADHARAJAN, Vijay; SAUNDERS, G et al.Lecture notes in computer science. 2002, pp 286-302, issn 0302-9743, isbn 3-540-43861-0, 17 p.Conference Paper

DRM 2002 : digital rights management (Washington DC, 18 November 2002, revised papers)Feigenham, Joan.Lecture notes in computer science. 2003, issn 0302-9743, isbn 3-540-40410-4, X, 220 p, isbn 3-540-40410-4Conference Proceedings

Architecting a Cloud-Scale Identity Fabric : CLOUD COMPUTINGOLDEN, Eric.Computer (Long Beach, CA). 2011, Vol 44, Num 3, pp 52-59, issn 0018-9162, 8 p.Article

Access control with single-key-lockMENG-LIH WU; TAI-YANG HWANG.IEEE transactions on software engineering. 1984, Vol 10, Num 2, pp 185-191, issn 0098-5589Article

Research of access control and coordination strategy in CSCWXUDONG LIU; QIUQI RUAN.International Conference on Signal Processing. 2004, pp 1360-1363, isbn 0-7803-8406-7, 4 p.Conference Paper

Using authority certificates to create management structures. DiscussionBABAK SADIGHI FIROZABADI; SERGOT, Marek; BANDMANN, Olav et al.Lecture notes in computer science. 2002, pp 134-150, issn 0302-9743, isbn 3-540-44263-4, 17 p.Conference Paper

Administration model for Or-BACCUPPENS, Frédéric; MIEGE, Alexandre.Lecture notes in computer science. 2003, pp 754-768, issn 0302-9743, isbn 3-540-20494-6, 15 p.Conference Paper

Protecting networks by controlling accessORTIZ, Sixto.Computer (Long Beach, CA). 2007, Vol 40, Num 8, pp 16-19, issn 0018-9162, 4 p.Article

Large homogeneous communication networks with Markovian access control. I: Equilibria and local stabilityCICERO, J; MEERKOV, S. M.Journal of mathematical analysis and applications. 1984, Vol 103, Num 2, pp 481-496, issn 0022-247XArticle

Une nouvelle catégorie de carte d'identification: les porte-clés de contrôle d'accès = A new type of identification card: the master keys of access controlGUILLOU, L.Onde électrique. 1984, Vol 64, Num 1, pp 24-27, issn 0030-2430Article

Impact of legislation on information security managementLOBREE, Bruce A.Information systems security. 2002, Vol 11, Num 5, pp 41-48, issn 1065-898X, 8 p.Article

dRBAC: Distributed role-based Access Control for dynamic coalition environmentsFREUDENTHAL, Eric; PESIN, Tracy; PORT, Lawrence et al.Proceedings of the ... International Conference on Distributed Computing Systems. 2002, pp 411-420, issn 1063-6927, isbn 0-7695-1585-1, 10 p.Conference Paper

Techniques de contrôle d'accès à haut débit basées sur l'ATM pour les applications multimédia = High-Performance MAC Protocols Based on ATM for MultimediaJiang, Shengming; Pujolle, Guy.1995, 152 p.Thesis

The consistency of an access Control ListLI, Shou-Peng; WU, Shi-Zhong; TAO GUO et al.Lecture notes in computer science. 2002, pp 367-373, issn 0302-9743, isbn 3-540-00164-6, 7 p.Conference Paper

DYNAMIC TRUST MANAGEMENTBLAZE, Matt; KANNAN, Sampath; LEE, Insup et al.Computer (Long Beach, CA). 2009, Vol 42, Num 2, pp 43-52, issn 0018-9162, 10 p.Article

Computer security (ESORICS 2005)De Capitani di Vimercati, Sabrina; Syverson, Paul; Gollmann, Dieter et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28963-1, 1Vol, XI-508 p, isbn 3-540-28963-1Conference Proceedings

A token based distributed algorithm for medium access in an optical ring networkTURUK, A. K; KUMAR, R; BADRINATH, R et al.Lecture notes in computer science. 2003, pp 340-349, issn 0302-9743, isbn 3-540-20745-7, 10 p.Conference Paper

Wireless digital-ultrasonics sensors for proximity ID, access control, firearm control and C3I in Homeland Security and Law Enforcement ApplicationsFORCIER, Bob.SPIE proceedings series. 2003, pp 289-296, isbn 0-8194-4930-X, 8 p.Conference Paper

Authentication and discretionary access control in computer networksKARGER, P. A.Computer networks and ISDN systems. 1985, Vol 10, Num 1, pp 27-37, issn 0169-7552Article

CAC with Nonlinearly-Constrained Feasibility RegionsCELLO, Marco; GNECCO, Giorgio; MARCHESE, Mario et al.IEEE communications letters. 2011, Vol 15, Num 4, pp 467-469, issn 1089-7798, 3 p.Article

Solutions NAC de contrôle d'accès au réseau = Network Access Control solutionsCHARLOT, Cécilien.Techniques de l'ingénieur. Sécurité des systèmes d'information. 2008, Vol SI2, Num H5845, issn 1953-4663, H5845.1-H5845.9Article

An integrated approach to federated identity and privilege management in open systemsBHATTI, Rafae; BERTINO, Elisa; GHAFOOR, Arif et al.Communications of the ACM. 2007, Vol 50, Num 2, pp 81-87, issn 0001-0782, 7 p.Article

Implementing an access control system for SVG documentsFERNANDEZ-MEDINA, E; RUIZ, G; DE CAPITANI DI VIMERCATI, S et al.Lecture notes in computer science. 2003, pp 741-753, issn 0302-9743, isbn 3-540-20494-6, 13 p.Conference Paper

Distributed access control: A logic-based approachBARKER, Steve.Lecture notes in computer science. 2003, pp 217-228, issn 0302-9743, isbn 3-540-40797-9, 12 p.Conference Paper

  • Page / 256