|
Access complications and management / / Zakhia S. Saliba,Georges S. Tabet, andChady C. Kallassy --
|
2015
|
1
|
|
Access Control Based on Location and Time / / Suresh Limkar, Nivedita Kadam and Rakesh Kumar Jha
|
2012
|
1
|
|
Access Control Configuration for J2EE Web Applications: A Formal Perspective / / Matteo Maria Casalino, Romuald Thion and Mohand-Said Hacid --
|
2012
|
1
|
|
Access Control for HTTP Operations on Linked Data / / Luca Costabello ... et al. --
|
2013
|
1
|
|
Access Control for OPM Provenance Graphs / / Roxana Danger, Robin Campbell Joy, John Darlington and Vasa Curcin --
|
2012
|
1
|
|
Access Control for Smart Manufacturing Systems / / Björn Leander, Aida Čaušević, Hans Hansson, and Tomas Lindström --
|
2020
|
1
|
|
An Access Control Framework for Pervasive Mobile Healthcare Systems Utilizing Cloud Services / / Mikaela Poulymenopoulou, Flora Malamateniou and George Vassilacopoulos --
|
2012
|
1
|
|
Access Control in Multi-party Wireless Sensor Networks / / Jef Maerien, Sam Michiels, Christophe Huygens, Danny Hughes --
|
2013
|
1
|
|
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility / / Nadav Voloch, Priel Levy, Mor Elmakies, Ehud Gudes --
|
2019
|
1
|
|
Access Control Models for XML / / Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi and Pierangela Samarati --3
|
2008
|
1
|