Search Result Save to File Save as CSV
Your search for 16126 returns 1778 document(s)
An access control model supporting periodicity contraints and temporal reasoning
Author: Elisa Bertino | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
On verification of database temporal contraints (169-179)
Author: C. H. Kung; | Call Number: SEM-357 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A lattice based access control model, Hal. 3021-3025
Author: Mian Cai; Wenjie Yang; Wei Guo; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Hierarchical Access Control Model for Video Database Systems, page 155-191
Author: E. Bertino, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
A Distributed Push-Based XML Access control Model for Better Scalability,Hal. 20-26
Author: Waleed Halboob, Ali Mamat, Ramlan Mahmud; | Call Number: SEM-305 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Model Driven Security: From UML Models to Access Control Infrastructures, page 39-91
Author: D. Basin, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
An Empirical Study of the Characteristics of Access Control Model Towards Secure KMS in Collaborative Environment (hal 1378-1383)
Author: Azreena Abu Bakar, Rusli Abdullah, Nur Izura Udzir, Hamidah Ibrahim; | Call Number: SEM-368 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Access control for large collections, page 154
Author: H.M. Gladney | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Access control for energy-efficient query processing, 134-139
Author: Dongchan An, Minji Jo, Seog Park; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
do we really need access control? (hal 493-502)
Author: edga R. weippl i) eweippl@securityresearch.at; | Call Number: SEM-363 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next