Search

Your search keyword '"Access Control"' showing total 5,894 results

Search Constraints

Start Over You searched for: Descriptor "Access Control" Remove constraint Descriptor: "Access Control" Topic 02 engineering and technology Remove constraint Topic: 02 engineering and technology
5,894 results on '"Access Control"'

Search Results

1. Indirect Revocable KP-ABE With Revocation Undoing Resistance

2. IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks

3. A Flexible Enhanced Throughput and Reduced Overhead (FETRO) MAC Protocol for ETSI SmartBAN

4. Fast and Secure Data Accessing by Using DNA Computing for the Cloud Environment

5. An Automatic Attribute-Based Access Control Policy Extraction From Access Logs

6. Secure and practical access control mechanism for WSN with node privacy

7. LIKC: A liberty of encryption and decryption through imploration from K-cloud servers

8. RSA based encryption approach for preserving confidentiality of big data

9. Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers

10. Efficient IoT Management With Resilience to Unauthorized Access to Cloud Storage

11. Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT

12. Enabling Efficient Data Sharing With Auditable User Revocation for IoV Systems

13. Access Control Protocol for Battlefield Surveillance in Drone-Assisted IoT Environment

14. Toward Architectural and Protocol-Level Foundation for End-to-End Trustworthiness in Cloud/Fog Computing

15. A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection

16. Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing

17. Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud

18. Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things

19. ComFlex: Composable and Flexible Resource Management for the IoT

20. Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT

21. A blockchain-based preserving and sharing system for medical data privacy

22. Capability-based IoT access control using blockchain

23. Fair multi-owner search over encrypted data with forward and backward privacy in cloud-assisted Internet of Things

24. DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles

25. ProFact: A Provenance-Based Analytics Framework for Access Control Policies

26. Smart Collaborative Balancing for Dependable Network Components in Cyber-Physical Systems

27. LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments

28. PAASH: A privacy-preserving authentication and fine-grained access control of outsourced data for secure smart health in smart cities

29. A blockchain-empowered AAA scheme in the large-scale HetNet

30. An Intelligent Edge-Chain-Enabled Access Control Mechanism for IoV

31. A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks

32. A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices

33. A novel approach of privacy-preserving data sharing system through data-tagging with role-based access control

34. A unified blockchain-based platform for global e-waste management

35. Flexible, decentralised access control for smart buildings with smart contracts

36. Fortified-Chain: A Blockchain-Based Framework for Security and Privacy-Assured Internet of Medical Things With Effective Access Control

37. DCSS Protocol for Data Caching and Sharing Security in a 5G Network

38. A Novel User Collusion-Resistant Decentralized Multi-Authority Attribute-Based Encryption Scheme Using the Deposit on a Blockchain

39. Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud

40. Secure crowd-sensing protocol for fog-based vehicular cloud

41. Fine-Grained Frequency Reuse in Centralized Small Cell Networks

42. Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things

43. Resilient Desynchronization for Decentralized Medium Access Control

44. Using Conditional Random Fields to Optimize a Self-Adaptive Bell–LaPadula Model in Control Systems

45. Methods for assessing the efficiency of access control subsystems at informatization facilities of internal affairs bodies and aspects of their improvement

46. A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture

47. Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT

48. A Common Method of Share Authentication in Image Secret Sharing

49. Proposal and Performance Evaluation of Information Diffusion Technique with Novel Virtual-Cell-Based Wi-Fi Direct

50. A Blockchain-Based Medical Data Sharing Mechanism with Attribute-Based Access Control and Privacy Protection

Catalog

Books, media, physical & digital resources