Access control

Results: 10445



#Item
31Modelling Dynamic Access Control Policies for Web-based Collaborative Systems Hasan Qunoo and Mark Ryan School of Computer Science, University of Birmingham, UK  Abstract. We present a modelling language, called X-Policy

Modelling Dynamic Access Control Policies for Web-based Collaborative Systems Hasan Qunoo and Mark Ryan School of Computer Science, University of Birmingham, UK Abstract. We present a modelling language, called X-Policy

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2010-02-17 13:26:47
    32Paradigm Regained: Abstraction Mechanisms for Access Control Mark S. Miller Hewlett Packard Laboratories, Johns Hopkins University

    Paradigm Regained: Abstraction Mechanisms for Access Control Mark S. Miller Hewlett Packard Laboratories, Johns Hopkins University

    Add to Reading List

    Source URL: erights.org

    Language: English - Date: 2016-12-29 20:50:58
      33Paradigm Regained: Abstraction Mechanisms for Access Control Mark S. Miller Hewlett Packard Laboratories, Johns Hopkins University

      Paradigm Regained: Abstraction Mechanisms for Access Control Mark S. Miller Hewlett Packard Laboratories, Johns Hopkins University

      Add to Reading List

      Source URL: erights.org

      Language: English - Date: 2016-12-29 20:50:58
        34Fine-Grained_Access_Control.MDI

        Fine-Grained_Access_Control.MDI

        Add to Reading List

        Source URL: remotescripts.ecu.edu

        Language: English - Date: 2011-07-14 14:27:52
          35Sample Access Control Plan- The purpose of this text is NOT to dictate a certain format or content, but to show one simple way of fulfilling the requirement to prepare access control plans that identify measures and proc

          Sample Access Control Plan- The purpose of this text is NOT to dictate a certain format or content, but to show one simple way of fulfilling the requirement to prepare access control plans that identify measures and proc

          Add to Reading List

          Source URL: deemedexports.noaa.gov

          Language: English - Date: 2011-08-12 15:15:11
            36Facts about Domestic Violence and Economic Abuse WHAT IS ECONOMIC ABUSE? When an abuser takes control of or limits access to shared or individual assets or limits the current or future earning potential of the victim as

            Facts about Domestic Violence and Economic Abuse WHAT IS ECONOMIC ABUSE? When an abuser takes control of or limits access to shared or individual assets or limits the current or future earning potential of the victim as

            Add to Reading List

            Source URL: www.speakcdn.com

            Language: English - Date: 2017-08-02 09:38:04
              37A Network-Aware Access Control System for Providing Good Enough Security to Low Value Information Reena Singh and Timothy A. Gonsalves Indian Institute of Technology, Mandi

              A Network-Aware Access Control System for Providing Good Enough Security to Low Value Information Reena Singh and Timothy A. Gonsalves Indian Institute of Technology, Mandi

              Add to Reading List

              Source URL: tinytocs.ece.utexas.edu

              Language: English - Date: 2016-03-05 17:06:25
                38Policy 652 Card Key Access Control

                Policy 652 Card Key Access Control

                Add to Reading List

                Source URL: oit.alabama.gov

                Language: English - Date: 2017-09-20 12:16:31
                  39Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds Frank Wang MIT CSAIL  James Mickens

                  Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds Frank Wang MIT CSAIL James Mickens

                  Add to Reading List

                  Source URL: people.csail.mit.edu

                  Language: English