Found: 13
Select item for more details and to access through your institution.
Adaptive Noise Injection against Side-Channel Attacks on ARM Platform.
- Published in:
- EAI Endorsed Transactions on Security & Safety, 2019, v. 6, n. 19, p. 1, doi. 10.4108/eai.25-1-2019.159346
- By:
- Publication type:
- Article
The ACACD model for mutable activity control and chain of dependencies in smart and connected systems.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 5, p. 3283, doi. 10.1007/s10207-024-00881-5
- By:
- Publication type:
- Article
An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach.
- Published in:
- Information (2078-2489), 2022, v. 13, n. 2, p. N.PAG, doi. 10.3390/info13020060
- By:
- Publication type:
- Article
A roadmap for privacy-enhanced secure data provenance.
- Published in:
- Journal of Intelligent Information Systems, 2014, v. 43, n. 3, p. 481, doi. 10.1007/s10844-014-0322-7
- By:
- Publication type:
- Article
Multi-tenancy authorization models for collaborative cloud services.
- Published in:
- Concurrency & Computation: Practice & Experience, 2015, v. 27, n. 11, p. 2851, doi. 10.1002/cpe.3446
- By:
- Publication type:
- Article
Editorial.
- Published in:
- 2012
- By:
- Publication type:
- Editorial
Editorial.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. 225, doi. 10.1109/TDSC.2010.32
- By:
- Publication type:
- Article
A User-Activity-Centric Framework for Access Control in Online Social Networks.
- Published in:
- IEEE Internet Computing, 2011, v. 15, n. 5, p. 62, doi. 10.1109/MIC.2011.111
- By:
- Publication type:
- Article
Enhancing Data Authenticity and Integrity in P2P Systems.
- Published in:
- IEEE Internet Computing, 2005, v. 9, n. 6, p. 42, doi. 10.1109/MIC.2005.124
- By:
- Publication type:
- Article
Identity Management.
- Published in:
- IEEE Internet Computing, 2003, v. 7, n. 6, p. 26, doi. 10.1109/MIC.2003.1250580
- By:
- Publication type:
- Article
Good-Enough Security.
- Published in:
- IEEE Internet Computing, 2003, v. 7, n. 1, p. 66, doi. 10.1109/MIC.2003.1167341
- By:
- Publication type:
- Article
The Technology of Trust.
- Published in:
- IEEE Internet Computing, 2002, v. 6, n. 6, p. 28
- By:
- Publication type:
- Article
Foreword.
- Published in:
- Intelligent Automation & Soft Computing, 2016, v. 22, n. 3, p. 341, doi. 10.1080/10798587.2016.1146506
- By:
- Publication type:
- Article