Works matching DE "COMPUTER access control software"
Results: 51
INTERVIEW WITH SECRETARY OF THE AIR FORCE FRANK KENDALL.
- Published in:
- Defense Acquisition, 2024, v. 53, n. 300, p. 4
- By:
- Publication type:
- Article
Employing UML and OCL for designing and analysing role-based access control.
- Published in:
- Mathematical Structures in Computer Science, 2013, v. 23, n. 4, p. 796, doi. 10.1017/S0960129512000266
- By:
- Publication type:
- Article
Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN.
- Published in:
- Future Internet, 2020, v. 12, n. 1, p. 15, doi. 10.3390/fi12010015
- By:
- Publication type:
- Article
CLOUD PLATFORM FOR ROBOTARIUMS WITH WIRELESS COVERAGE NETWORKS, ENSURING SERVICE ROBOTS WITH PARALLEL SIMULATION.
- Published in:
- Annals of DAAAM & Proceedings, 2019, v. 30, p. 1160, doi. 10.2507/30th.daaam.proceedings.163
- By:
- Publication type:
- Article
Aplicación de UML y SCRUM al desarrollo del software sobre control de acceso.
- Published in:
- Información Tecnológica, 2021, v. 32, n. 5, p. 57, doi. 10.4067/S0718-07642021000500057
- By:
- Publication type:
- Article
Security Analysis of the Access Control Solution of NDN Using BAN Logic.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 3, p. 1162, doi. 10.1007/s11036-019-01435-z
- By:
- Publication type:
- Article
DOCUMENTATION AND COMPUTERS IN THIRD WORLD DEVELOPMENT.
- Published in:
- International Journal of Public Administration, 1991, v. 14, n. 2, p. 193, doi. 10.1080/01900699108524713
- By:
- Publication type:
- Article
On-the-Fly Repairing of Atomicity Violations in ARINC 653 Software.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 4, p. 2014, doi. 10.3390/app12042014
- By:
- Publication type:
- Article
Blockchain Based Model for Security.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 2, p. 1707
- By:
- Publication type:
- Article
MODELOVANJE KONTROLE PRISTUPA.
- Published in:
- InfoM, 2013, n. 45, p. 34
- By:
- Publication type:
- Article
Data Usage and Access Control in Industrial Data Spaces: Implementation Using FIWARE.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 9, p. 3885, doi. 10.3390/su12093885
- By:
- Publication type:
- Article
Secure, Dynamic and Distributed Access Control Stack for Database Applications.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2015, v. 25, n. 9/10, p. 1703, doi. 10.1142/S0218194015710035
- By:
- Publication type:
- Article
Fine-Grained Access Control via XACML Policy Optimization in Cloud Computing.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2015, v. 25, n. 9/10, p. 1709, doi. 10.1142/S0218194015710047
- By:
- Publication type:
- Article
Detecting Incorrect Uses of Combining Algorithms in XACML 3.0 Policies.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2015, v. 25, n. 9/10, p. 1551, doi. 10.1142/S021819401540032X
- By:
- Publication type:
- Article
Texture based features for robust palmprint recognition: a comparative study.
- Published in:
- EURASIP Journal on Information Security, 2015, v. 2015, p. 1, doi. 10.1186/s13635-015-0022-z
- By:
- Publication type:
- Article
Policy expressions and the bottom-up design of computing policies.
- Published in:
- Computing, 2019, v. 101, n. 9, p. 1307, doi. 10.1007/s00607-018-0655-0
- By:
- Publication type:
- Article
IDOT: Black-Box Detection of Access Control Violations in Web Applications.
- Published in:
- ISeCure, 2021, v. 13, n. 2, p. 117, doi. 10.22042/isecure.2021.254089.580
- By:
- Publication type:
- Article
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems.
- Published in:
- ISeCure, 2020, v. 12, n. 2, p. 126
- By:
- Publication type:
- Article
MODERN TECHNOLOGIES USED IN DATA UPDATING FOR A SCHOOL FARM MODERNIZATION.
- Published in:
- DAAAM International Scientific Book, 2014, p. 423, doi. 10.2507/daaam.scibook.2014.34
- By:
- Publication type:
- Article
YENİ BİR AĞ GÜVENLİĞİ YAKLAŞIMI: DİNAMİK ZEKİ GÜVENLİK DUVARI MİMARİSİ.
- Published in:
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2014, v. 29, n. 4, p. 707, doi. 10.17341/gummfd.18495
- By:
- Publication type:
- Article
BRIVO MOBILE PASS.
- Published in:
- 2015
- By:
- Publication type:
- Product Review
A Bidirectional Polling MAC Mechanism for IoT.
- Published in:
- Electronics (2079-9292), 2019, v. 8, n. 6, p. 715, doi. 10.3390/electronics8060715
- By:
- Publication type:
- Article
OAuthkeeper: An Authorization Framework for Software Defined Network.
- Published in:
- Journal of Network & Systems Management, 2018, v. 26, n. 1, p. 147, doi. 10.1007/s10922-017-9411-6
- By:
- Publication type:
- Article
Performance analysis of a k-round contention resolution scheme for WLANs.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2015, v. 51, n. 6, p. 532, doi. 10.1049/el.2014.3135
- By:
- Publication type:
- Article
FACIAL RECOGNITION TECHNOLOGY.
- Published in:
- 2017
- By:
- Publication type:
- Question & Answer
C3ware: A Middleware Supporting Collaborative Services over Cloud Storage.
- Published in:
- Computer Journal, 2014, v. 57, n. 2, p. 217, doi. 10.1093/comjnl/bxs168
- By:
- Publication type:
- Article
An Improved Contention Access Mechanism for FPRP to Increase Throughput.
- Published in:
- ETRI Journal, 2013, v. 35, n. 1, p. 58, doi. 10.4218/etrij.13.0111.0725
- By:
- Publication type:
- Article
The Control Packet Collision Avoidance Algorithm for the Underwater Multichannel MAC Protocols via Time-Frequency Masking.
- Published in:
- Discrete Dynamics in Nature & Society, 2016, p. 1, doi. 10.1155/2016/2437615
- By:
- Publication type:
- Article
ACCESS CONTROL FOR SHARED ONTOLOGIES.
- Published in:
- International Journal of Electronic Commerce Studies, 2013, v. 4, n. 2, p. 281, doi. 10.7903/ijecs.1039
- By:
- Publication type:
- Article
Security and Privacy Enhancing For Dynamic Groups in the Cloud Using Batch Auditing.
- Published in:
- International Journal of Advanced Research in Computer Science, 2013, v. 4, n. 10, p. 154
- By:
- Publication type:
- Article
Audits of IT Logical and Physical Access Controls.
- Published in:
- New Perspectives on Healthcare Risk Management, Control & Governance, 2015, v. 34, n. 1, p. 28
- By:
- Publication type:
- Article
Link-Utility-Based Improved Backoff Cooperative MAC Protocol for MANET.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 7, p. 1613
- By:
- Publication type:
- Article
XML Access Control Models and Mechanisms: a Survey.
- Published in:
- International Review on Computers & Software, 2012, v. 7, n. 4, p. 1518
- By:
- Publication type:
- Article
A Framework to Improve Virtual Private Network Architecture for Secure Data Transmission Using CMT-PA and Multi-Homing.
- Published in:
- International Review on Computers & Software, 2012, v. 7, n. 4, p. 1419
- By:
- Publication type:
- Article
Agent-Based Semantic Role Mining for Intelligent Access Control in Multi-Domain Collaborative Applications of Smart Cities.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 13, p. 4253, doi. 10.3390/s21134253
- By:
- Publication type:
- Article
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 9, p. 2464, doi. 10.3390/s20092464
- By:
- Publication type:
- Article
OPEN SOURCE, DYNAMIC SYSTEMS AND SELF-ORGANIZATION.
- Published in:
- Peace & Conflict Monitor, 2020, p. 1
- By:
- Publication type:
- Article
Integrating Security Aspects into Business Process Models.
- Published in:
- IT: Information Technology, 2013, v. 55, n. 6, p. 239, doi. 10.1524/itit.2013.2004
- By:
- Publication type:
- Article
A Computational Dynamic Trust Model for User Authorization.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2015, v. 12, n. 1, p. 1, doi. 10.1109/TDSC.2014.2309126
- By:
- Publication type:
- Article
Meeting Cardinality Constraints in Role Mining.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2015, v. 12, n. 1, p. 71, doi. 10.1109/TDSC.2014.2309117
- By:
- Publication type:
- Article
Globally Distributed Pendulum Experiment as an Educational Resource on e-lab.
- Published in:
- International Journal of Online Engineering, 2013, p. 47, doi. 10.3991/ijoe.v9iS8.3381
- By:
- Publication type:
- Article
Linking norms, ratings, and relations of words and concepts across multiple language varieties.
- Published in:
- Behavior Research Methods, 2022, v. 54, n. 2, p. 864, doi. 10.3758/s13428-021-01650-1
- By:
- Publication type:
- Article
A Fully Secure Ciphertext-Policy Attribute-Based Encryption With a Tree-Based Access Structure.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 1, p. 247
- By:
- Publication type:
- Article
An attribute-based lightweight cloud data access control using hypergraph structure.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 8, p. 6040, doi. 10.1007/s11227-019-03119-7
- By:
- Publication type:
- Article
Providing Ontology-Based Access Control for Cloud Data by Exploiting Subsumption Property among Domains of Access Control.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2019, v. 12, n. 3, p. 280, doi. 10.22266/ijies2019.0630.27
- By:
- Publication type:
- Article
Identity-based access control for pro-active message's DTN.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 14, p. 2323, doi. 10.1002/sec.1494
- By:
- Publication type:
- Article
Implementation of web scraping on GitHub task monitoring system.
- Published in:
- Telkomnika, 2019, v. 17, n. 1, p. 275, doi. 10.12928/TELKOMNIKA.v17i1.11613
- By:
- Publication type:
- Article
Assessing Access Control Risk for mHealth: A Delphi Study to Categorize Security of Health Data and Provide Risk Assessment for Mobile Apps.
- Published in:
- Journal of Healthcare Engineering, 2020, p. 1, doi. 10.1155/2020/5601068
- By:
- Publication type:
- Article
'I tried to take my phone off my daughter, and i got hit in the face': a qualitative study of parents' challenges with adolescents' screen use and a toolbox of their tips.
- Published in:
- BMC Public Health, 2024, v. 24, n. 1, p. 1, doi. 10.1186/s12889-024-17690-z
- By:
- Publication type:
- Article
ACCESS CONTROL SYSTEM FOR RFID-TAGGED DOCUMENTS IN SUPPLY CHAIN MANAGEMENT.
- Published in:
- LogForum, 2017, v. 13, n. 1, p. 91, doi. 10.17270/J.LOG.2017.1.8
- By:
- Publication type:
- Article