Authorisation

A distributed smart card based access control system

Access Control / Smart Cards / Smart Card / Authorisation / Access Point / Internet

Access Control Mechanism For Web Databases By Using Parameterized Cursor

Computer Science / Access Control / Databases / Sql Injection / Authorisation / Information Analysis / Web Databases / Internet / Application Software / Information Analysis / Web Databases / Internet / Application Software

A System for Distributed SELinux Policy Management

Control / Access Control / OPERATING SYSTEM / Distributed Processing / Policy Management / Policies / Authorisation / Specification Language / Kerberos / Distributed Environment / Policies / Authorisation / Specification Language / Kerberos / Distributed Environment

A System for Distributed SELinux Policy Management

Control / Access Control / OPERATING SYSTEM / Distributed Processing / Policy Management / Policies / Authorisation / Specification Language / Kerberos / Distributed Environment / Policies / Authorisation / Specification Language / Kerberos / Distributed Environment

A role-based access control policy verification framework for real-time systems

Access Control / Verification and Validation / Petri Nets / Formal Specification / Real Time Systems / Active Database / Formal Verification / Access Control Models / Petri Net / Workflow Management System / Authorisation / Real Time Application / Role Based Access Control / Active Database / Formal Verification / Access Control Models / Petri Net / Workflow Management System / Authorisation / Real Time Application / Role Based Access Control

A System for Distributed SELinux Policy Management

Control / Access Control / OPERATING SYSTEM / Distributed Processing / Policy Management / Policies / Authorisation / Specification Language / Kerberos / Distributed Environment / Policies / Authorisation / Specification Language / Kerberos / Distributed Environment

Access control meets public key infrastructure, or: Assigning roles to strangers

Business / Logic Programming / Public Key Infrastructure / Access Control / Trust Management / Authentication / Key Management / Public key cryptography / Authorisation / Certification / Web Server / Bottom Up / Role Based Access Control / Internet / X / Electronic Commerce / Message Authentication / Authentication / Key Management / Public key cryptography / Authorisation / Certification / Web Server / Bottom Up / Role Based Access Control / Internet / X / Electronic Commerce / Message Authentication

Physical Access Control for Captured RFID Data

Distributed Computing / Privacy / RFID / Access Control / Data Management / Pervasive Computing / Data Privacy / Authorisation / Pervasive Computing / Data Privacy / Authorisation

IoT Access Control Issues: A Capability Based Approach

Privacy / Internet of Things / Distributed Systems / Delegation / Sensors / Maintenance Engineering / Authorisation / Authorization / Internet / Maintenance Engineering / Authorisation / Authorization / Internet

Chaotic Progressive Access Control for JPEG2000 Images Repositories

Quantum Computing / Artificial Intelligence / Environmental Education / Machine Learning / Data Mining / Network Security / Access Control / Wireless Sensor Networks / Cryptography / Chaotic cryptography / Cloud Computing / Digital Image Processing / Java / Smart spaces / Indigenous knowledge systems / Cyber Physical Systems / Complex Event Processing / Wavelet Transform / Wavelet Transforms / Cyber Security / Semantic Computing / Chaotic Map / Unimodal Maps / JPEG / Authorisation / Permutation Only Ciphers / Substitution Permutation Networks / Image Compression Location Based Approach / CBNRM / Education for Sustainable Development / Encryption Algorithms / Arnold Map / Secure Image Transmission / Access Control Schemes / Decryption Process / Gray Levels / Image Codestreams / Digital Image Storage / VoIP/SIP/IMS / Distributed Information Systems / RFID and Sensor Networks / Open Source Technologies / Wild/Indigenous & Traditional Food Plants / Traditional Agrobiodiversity Conservation / Food Sovereignty & Food Security / Discrete Fractional Fourier Transform / Wavelet Transform and Filter Banks / Digital Signal Processing and Its Applications / Sensor Array Signal Processing / Two Dimensional Digital Filters / Topological Entropy / Packet Analysis / Server Operating Systems / NET Software Development / Network Security / Access Control / Wireless Sensor Networks / Cryptography / Chaotic cryptography / Cloud Computing / Digital Image Processing / Java / Smart spaces / Indigenous knowledge systems / Cyber Physical Systems / Complex Event Processing / Wavelet Transform / Wavelet Transforms / Cyber Security / Semantic Computing / Chaotic Map / Unimodal Maps / JPEG / Authorisation / Permutation Only Ciphers / Substitution Permutation Networks / Image Compression Location Based Approach / CBNRM / Education for Sustainable Development / Encryption Algorithms / Arnold Map / Secure Image Transmission / Access Control Schemes / Decryption Process / Gray Levels / Image Codestreams / Digital Image Storage / VoIP/SIP/IMS / Distributed Information Systems / RFID and Sensor Networks / Open Source Technologies / Wild/Indigenous & Traditional Food Plants / Traditional Agrobiodiversity Conservation / Food Sovereignty & Food Security / Discrete Fractional Fourier Transform / Wavelet Transform and Filter Banks / Digital Signal Processing and Its Applications / Sensor Array Signal Processing / Two Dimensional Digital Filters / Topological Entropy / Packet Analysis / Server Operating Systems / NET Software Development

Towards access control for logical document structures

Information Systems / XML / Access Control / Hypertext / Authorisation / Lattices / Authorization / Security Model / Document Structure / Structured document Retrieval / Web Server / Internet / Partial Order / Read Only Memory / Lattices / Authorization / Security Model / Document Structure / Structured document Retrieval / Web Server / Internet / Partial Order / Read Only Memory

Type-based distributed access control

Access Control / Public key cryptography / Authorisation / Type System / Information Flow Control
Copyright © 2017 DADOSPDF Inc.