|
|
Access Control and Security --
|
2011
|
1
|
|
Access Control and Security Monitoring of Multimedia Information Processing and Transmission
|
2023
|
1
|
|
Access control and security systems
|
1995-
|
1
|
|
Access control & security systems integration
|
1995-
|
1
|
Your entry Access control & security systems integration. Buyers' guide issue would be here
-- Search as Words
|
|
Access Control Based on Location and Time / / Suresh Limkar, Nivedita Kadam and Rakesh Kumar Jha
|
2012
|
1
|
|
Access Control Configuration for J2EE Web Applications: A Formal Perspective / / Matteo Maria Casalino, Romuald Thion and Mohand-Said Hacid --
|
2012
|
1
|
|
Access Control Defensive Categories and Types --
|
2012
|
1
|
|
Access control for database systems -- / 7.6.
|
2011
|
1
|
|
Access control for geospatial data -- / 7.7.2.
|
2011
|
1
|
|
Access Control for HTTP Operations on Linked Data / / Luca Costabello ... et al. --
|
2013
|
1
|
|
Access control for location privacy -- / 7.7.3.
|
2011
|
1
|
|
Access Control for OPM Provenance Graphs / / Roxana Danger, Robin Campbell Joy, John Darlington and Vasa Curcin --
|
2012
|
1
|
|
Access Control for Smart Manufacturing Systems / / Björn Leander, Aida Čaušević, Hans Hansson, and Tomas Lindström --
|
2020
|
1
|
|
An Access Control Framework for Pervasive Mobile Healthcare Systems Utilizing Cloud Services / / Mikaela Poulymenopoulou, Flora Malamateniou and George Vassilacopoulos --
|
2012
|
1
|
|
Access Control Fundamentals -- / 8.
|
2009
|
1
|
|
Access Control in a Class --
|
2012
|
1
|
|
Access control in data management systems
|
2010
|
1
|
|
Access Control in Multi-party Wireless Sensor Networks / / Jef Maerien, Sam Michiels, Christophe Huygens, Danny Hughes --
|
2013
|
1
|
|
Access control lists --
|
2012
|
1
|
|
Access Control Lists for HDFS --
|
2014?
|
1
|
|
Access control management in cloud environments
|
2020
|
1
|
|
Access control method absed on a mutual trust mechanism in the edgecomputing environment --
|
2021
|
1
|
|
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility / / Nadav Voloch, Priel Levy, Mor Elmakies, Ehud Gudes --
|
2019
|
1
|
|
Access control model for healthcare system / / Yifeng Shen --
|
2008
|
1
|
|
Access Control Model in Migrating Workflow System with Site Service Alliance / / Wei Su and Guangzhou Zeng --
|
2012
|
1
|
|
Access Control Models --
|
2012
|
1
|
|
Access control models and architectures for IoT and cyber physical systems
|
2022
|
1
|
|
Access Control Models for XML / / Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi and Pierangela Samarati --3
|
2008
|
1
|
|
Access Control Modifiers: Public, Protected, Private, Package Private --
|
2014
|
1
|
|
Access Control Policy -- / Appendix 12
|
2013
|
1
|
|
Access Control Policy Languages in XML / / Naizhen Qi and Michiharu Kudo --4
|
2008
|
1
|
|
Access control, privacy and trust in on-line social networks :
|
2011
|
1
|
|
Access control protocols and frameworks --
|
2012
|
1
|
|
Access control secur. syst. integr
|
1995-
|
1
|
|
Access Control, Security, and Trust : a Logical Approach
|
2010
|
1
|
|
Access Control System -- / 3.5.5.
|
2016
|
1
|
|
Access Control System by Face Recognition Based on S3C2440 / / Yongling Liu, Yong Lu and Yue Song --
|
2014
|
1
|
|
Access-control systems and methodology -- / Ch. 5.
|
2006
|
1
|
|
Access control systems for geospatial data and applications / / Maria Luisa Damiani, Elisa Bertino --
|
2007
|
1
|
|
Access control systems : security, identity management and trust models
|
2006
|
1
|
|
Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online Protection / / Namje Park, Yeonghae Ko --
|
2013
|
1
|
|
Access Control Technologies --
|
|
3
|
|
Access Control Under Inheritance
|
2012
|
1
|
|
Access Control Using Active Rules --
|
2012
|
1
|
|
Access Control Using Trusted Virtual Machine Based on Xen / / Chuan Cheng --
|
2011
|
1
|
|
Access controlled : the shaping of power, rights, and rule in cyberspace
|
|
3
|
|
The Access Controller / 84 --6.
|
2001
|
1
|
|
Access Controls / / Lauren Collins --1.
|
2014
|
1
|
|
Access, convergence and print on demand: the library dimension / / John Feather --14.
|
2006
|
1
|
|
Access cookbook
|
|
3
|
Add Marked to Bag
Add All On Page
Add Marked to My Lists
|