Search Result Save to File Save as CSV
Your search for 34562 returns 3878 document(s)
Grouping provenance information to improve efficiency of access control, (LNCS-Lecture Notes in Computer Science 5576) Hal. 51-59
Author: Amril Syalim; Yoshiaki; Konichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Formal verification for access control in web information sharing system, (LNCS-Lecture Notes in Computer Science 5576) Hal. 80-89
Author: Akihiro Sakai; Yoshiaki Hori; Kouichi Sakurai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
IT GOVERNANCE LAYANAN AKADEMIK ON-LINE DI UNIVERSITAS NASIONAL MENGGUNAKAN COBIT (CONTROL OBJECTIVES FOR INFORMATION AND RELANTED TECHNOLOGY) VERSI 4.0
Author: Heni Jusuf; | Call Number: SEM-341 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analisis IT maturity level instansi pemerintah berdasarkan control objective for information and related technology: studi kasus di LPNK"KLM"
Author: Eko Hadiyono Riyadi.; | Call Number: KA-048 (Sofcopy KA-048) | Edition: 2010 | Type: Karya Akhir (KA)
Find Similar |  Add To Favorites |  Detail in New Window 
Law-Governed Interaction: A Coordination and Control Mechanism for Heterogeneous Distributed Systems, page 273-305
Author: Naftaly H. Minsky, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Formal aspects of concurrency control on long-duration transaction systems using the NT/PV model, page 492
Author: Korth, Henry F. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Supporting ease-of-use and user control: desired fetures and structure of web-based online IR systems, page 899
Author: Hong (Iris) Xie | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Control synthesis for a class of hybrid systems subject to configuration-based safety constrains, Hal. 376-396
Author: Michael Heymann; Feng Lin; George Meyer; | Call Number: 004.33 Mal f | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Selective regression test for access control systems employing RBCA,(LNCS-Lecture Notes in Computer Science 5576) Hal. 70-79
Author: Chao Huang; Jianling Sun; Xinyu Wang; Yuanjie Si; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Threshold and bounded-delay voting in critical control systems, ((LNCS-Lecture Notes in Computer Science 1926) Hal 70-81
Author: Paul Caspi; Rym Salem; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   22 23 24 25 26 27 28 29 30 31  Next