Access Control

AGREE : exploiting energy harvesting to support data-centric access control in WSNs

Network Security / Access Control / The Internet of Things / Wireless Sensor Networks / Healthcare / Attribute Based Encryption

A compositional framework for access control policies enforcement

Access Control / Security Requirements / System Development / Formal Model / Simulation Tool / Access Control Policy

An efficient access control method for multimedia social networks

Access Control / Mathematical Analysis / Social Network

Adaptable Access Control Policies for Medical Information Systems

Access Control / Legislation / Access Control Policy

Implementing a modular access control service to support application-specific policies in CaesarJ

Access Control / Aspect Oriented Software Development / Application Server / Design and Implementation

ENDORSE

Access Control / Data Management / Legislation / Data Protection / Data Handling / Privacy Policy / Rule Based / Privacy Policy / Rule Based

Model-Checking Access Control Policies

Information Security / Model Checking / Access Control / Trust Management / Data Dependence / decision Procedure / Security Model / ISC / Access Control Policy / decision Procedure / Security Model / ISC / Access Control Policy

Model-Checking Access Control Policies

Information Security / Model Checking / Access Control / Trust Management / Data Dependence / decision Procedure / Security Model / ISC / Access Control Policy / decision Procedure / Security Model / ISC / Access Control Policy

A hierarchical access control model for video database systems

Information Systems / Access Control / Video Analysis / Library and Information Studies / Access Control Models / Indexation / Region of Interest / Video database / Indexation / Region of Interest / Video database

A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs

Management / Access Control / Inconsistency Management / Computer Languages / Firewall / Resource Management / Error Correction / Time Complexity / Authorisation / Anomaly / Computer Network Security / Polynomials / Access Control List / Application Software / Resource Management / Error Correction / Time Complexity / Authorisation / Anomaly / Computer Network Security / Polynomials / Access Control List / Application Software

X-GTRBAC admin: a decentralized administration model for enterprise wide access control

XML / Access Control / Computer Security / Temporal Constraints / Role Based Access Control

Instance-level access control for business-to-business electronic commerce

Information Systems / Access Control / Computer Software / Security Model / Business to Business / Electronic Commerce

An Access Control Language for a General Provenance Model

Access Control / Life Sciences / Data Security / Health Science / Secure data management

An access control model for video database systems

Information Visualization / Access Control / Clustering / Video Object / Access Control Models / Video database
Copyright © 2017 DATOSPDF Inc.