Search

Your search keyword '"Access Control"' showing total 48,606 results

Search Constraints

Start Over You searched for: Descriptor "Access Control" Remove constraint Descriptor: "Access Control"
48,606 results on '"Access Control"'

Search Results

1. Age Verification Systems Will Be a Personal Identifiable Information Nightmare.

2. Guide to Attribute Based Access Control (ABAC) definition and considerations

3. SymboleoAC: An Access Control Model for Legal Contracts

5. An Ontology-Based Approach for Handling Inconsistency in Explainable and Prioritized Access Control Models

6. Smart Environments: Information Flow Control in Smart Grids

8. POP-HIT: Partially Order-Preserving Hash-Induced Transformation for Privacy Protection in Face Recognition Access Control

9. Enhancing Cross-Device Security with Fine-Grained Permission Control

11. Access Control Analysis in Heterogeneous Big Data Management Systems.

12. Bilevel access control and constraint‐aware response provisioning in edge‐enabled software defined network‐internet of things network using the safeguard authentication dynamic access control model.

13. A secure VM live migration technique in a cloud computing environment using blowfish and blockchain technology.

14. BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment.

15. Examining nurses' awareness level and compliance between defined and required access levels to core functionalities of hospital information system : an observational and survey study.

16. Blockchain‐IoT: A revolutionary model for secure data storage and fine‐grained access control in internet of things.

17. Informal Land Tenure and Livelihood Resilience in the Chaco Salteño, Argentina.

18. Genetically optimized TD3 algorithm for efficient access control in the internet of vehicles.

19. An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption.

20. Time-limited ownership delegation scheme with revocation security for healthcare.

21. Rethinking Regulation beyond the Normative Threshold: Mechanisms of Control and Access to the Central Market of Kinshasa.

22. ESPRESSO: A Framework to Empower Search on the Decentralized Web: ESPRESSO: A Framework to Empower...: M. Ragab et al.

23. Implementing the principle of least administrative privilege on operating systems: challenges and perspectives.

24. Efficient and secure confidential transaction scheme based on commitment and aggregated zero-knowledge proofs.

25. 5G 移动通信网内生微隔离机制.

26. A multi-phase scalable, communication reliable, and energy efficient MAC (SRE-MAC) protocol for WBAN.

27. Enhancing Security in Smart Renewable Energy Grids Through Proxy Signcryption Approach.

28. A blockchain-based privacy-preserving and access-control framework for electronic health records management.

29. Secure and Lightweight Cluster-Based User Authentication Protocol for IoMT Deployment †.

30. Enhancing Iris Authentication for Managing Multiple Cancellations: Leveraging Quotient Filters.

31. An efficient texture descriptor based on local patterns and particle swarm optimization algorithm for face recognition.

32. TL-ABKS: Traceable and lightweight attribute-based keyword search in edge–cloud assisted IoT environment.

33. Person Identification Using Temporal Analysis of Facial Blood Flow.

34. Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications.

35. Boron Enabled Directed [2+2]‐ and Dearomative [4+2]‐Cycloadditions Initiated by Energy Transfer.

36. Only you can check my data: certificateless and designed-verifier auditing of multi-cloud storage with faults localization.

37. Stalk-eyed flies carrying a driving X chromosome compensate by increasing fight intensity.

38. Data-Sharing System with Attribute-Based Encryption in Blockchain and Privacy Computing †.

39. Privacy-Preserving ConvMixer Without Any Accuracy Degradation Using Compressible Encrypted Images.

40. Secure semi‐automated GDPR compliance service with restrictive fine‐grained access control.

41. Designing efficient patient‐centric smart contracts for healthcare ecosystems with access control capabilities.

42. An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things.

43. Research on Network Security Protection Technology Based on P2AEDR in New Low-Voltage Control Scenarios for Power IoT and Other Blockchain-Based IoT Architectures.

44. Unraveling the multiple facilitative effects of consumers on marine primary producers.

45. Business process discovery as a service with event log privacy and access control over discovered models.

46. Harnessing the amber waves: U.S. grain embargoes against the Soviet Union and the politics of insecurity, 1975–1980.

47. Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme.

48. A smart contract-driven access control scheme with integrity checking for electronic health records.

49. Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing.

50. Securing IoMT Applications: An Approach for Enhancing the Reliability of Security Policies within Cloud Databases.

Catalog

Books, media, physical & digital resources