|
1
|
|
ACCESS CONTROL --
|
|
14
|
2
|
|
Access Control and Auditing --
|
2010
|
1
|
3
|
|
Access Control and Authentication.
|
2013
|
1
|
4
|
|
Access Control and Authentication in WMN -- / 22.3.1.
|
2011
|
1
|
5
|
|
Access Control and Authentication Schemes -- / 22.4.1.
|
2011
|
1
|
6
|
|
Access control and authorization --
|
2013
|
1
|
7
|
|
Access Control and Information Protection --
|
2012
|
1
|
8
|
|
Access Control and Mobile Payment in Trustworthy UbiComp Environment --
|
2012
|
1
|
9
|
|
Access Control and Security --
|
2011
|
1
|
10
|
|
Access Control and Security Monitoring of Multimedia Information Processing and Transmission
|
2023
|
1
|
11
|
|
Access control and security systems
|
1995-
|
1
|
12
|
|
Access control & security systems integration
|
1995-
|
1
|
13
|
|
Access Control Based on Location and Time / / Suresh Limkar, Nivedita Kadam and Rakesh Kumar Jha
|
2012
|
1
|
14
|
|
Access Control Configuration for J2EE Web Applications: A Formal Perspective / / Matteo Maria Casalino, Romuald Thion and Mohand-Said Hacid --
|
2012
|
1
|
15
|
|
Access Control Defensive Categories and Types --
|
2012
|
1
|
16
|
|
Access control for database systems -- / 7.6.
|
2011
|
1
|
17
|
|
Access control for geospatial data -- / 7.7.2.
|
2011
|
1
|
18
|
|
Access Control for HTTP Operations on Linked Data / / Luca Costabello ... et al. --
|
2013
|
1
|
19
|
|
Access control for location privacy -- / 7.7.3.
|
2011
|
1
|
20
|
|
Access Control for OPM Provenance Graphs / / Roxana Danger, Robin Campbell Joy, John Darlington and Vasa Curcin --
|
2012
|
1
|
21
|
|
Access Control for Smart Manufacturing Systems / / Björn Leander, Aida Čaušević, Hans Hansson, and Tomas Lindström --
|
2020
|
1
|
22
|
|
An Access Control Framework for Pervasive Mobile Healthcare Systems Utilizing Cloud Services / / Mikaela Poulymenopoulou, Flora Malamateniou and George Vassilacopoulos --
|
2012
|
1
|
23
|
|
Access Control Fundamentals -- / 8.
|
2009
|
1
|
24
|
|
Access Control in a Class --
|
2012
|
1
|
25
|
|
Access control in data management systems
|
2010
|
1
|
26
|
|
Access Control in Multi-party Wireless Sensor Networks / / Jef Maerien, Sam Michiels, Christophe Huygens, Danny Hughes --
|
2013
|
1
|
27
|
|
Access control lists --
|
2012
|
1
|
28
|
|
Access Control Lists for HDFS --
|
2014?
|
1
|
29
|
|
Access control management in cloud environments
|
2020
|
1
|
30
|
|
Access control method absed on a mutual trust mechanism in the edgecomputing environment --
|
2021
|
1
|
31
|
|
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility / / Nadav Voloch, Priel Levy, Mor Elmakies, Ehud Gudes --
|
2019
|
1
|
32
|
|
Access control model for healthcare system / / Yifeng Shen --
|
2008
|
1
|
33
|
|
Access Control Model in Migrating Workflow System with Site Service Alliance / / Wei Su and Guangzhou Zeng --
|
2012
|
1
|
34
|
|
Access Control Models --
|
2012
|
1
|
35
|
|
Access control models and architectures for IoT and cyber physical systems
|
2022
|
1
|
36
|
|
Access Control Models for XML / / Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi and Pierangela Samarati --3
|
2008
|
1
|
37
|
|
Access Control Modifiers: Public, Protected, Private, Package Private --
|
2014
|
1
|
38
|
|
Access Control Policy -- / Appendix 12
|
2013
|
1
|
39
|
|
Access Control Policy Languages in XML / / Naizhen Qi and Michiharu Kudo --4
|
2008
|
1
|
40
|
|
Access control, privacy and trust in on-line social networks :
|
2011
|
1
|
41
|
|
Access control protocols and frameworks --
|
2012
|
1
|
42
|
|
Access control secur. syst. integr
|
1995-
|
1
|
43
|
|
Access Control, Security, and Trust : a Logical Approach
|
2010
|
1
|
44
|
|
Access Control System -- / 3.5.5.
|
2016
|
1
|
45
|
|
Access Control System by Face Recognition Based on S3C2440 / / Yongling Liu, Yong Lu and Yue Song --
|
2014
|
1
|
46
|
|
Access-control systems and methodology -- / Ch. 5.
|
2006
|
1
|
47
|
|
Access control systems for geospatial data and applications / / Maria Luisa Damiani, Elisa Bertino --
|
2007
|
1
|
48
|
|
Access control systems : security, identity management and trust models
|
2006
|
1
|
49
|
|
Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online Protection / / Namje Park, Yeonghae Ko --
|
2013
|
1
|
50
|
|
Access control technologies --
|
|
3
|
Add Marked to Bag
Add All On Page
|