51![Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT](https://www.pdfsearch.io/img/ff5cd93b69054481a10db7719e8925dc.jpg) | Add to Reading ListSource URL: www.cs.bham.ac.uk.Language: English - Date: 2009-02-25 10:33:24
|
---|
52![Access Control for IoT: A Position Paper Alan H. Karp Introduction We get work done with our computers almost in spite of their usability, rather than because of it. This statement is particularly true when it comes to c Access Control for IoT: A Position Paper Alan H. Karp Introduction We get work done with our computers almost in spite of their usability, rather than because of it. This statement is particularly true when it comes to c](https://www.pdfsearch.io/img/ab9651153d2671fb6fc1b5c28f7f14eb.jpg) | Add to Reading ListSource URL: alanhkarp.comLanguage: English - Date: 2016-01-30 23:35:47
|
---|
53![World-Driven Access Control for Continuous Sensing Franziska Roesner David Molnar Alexander Moshchuk World-Driven Access Control for Continuous Sensing Franziska Roesner David Molnar Alexander Moshchuk](https://www.pdfsearch.io/img/bd2b61a76c31091d3946dcf20caad86d.jpg) | Add to Reading ListSource URL: www.franziroesner.comLanguage: English - Date: 2014-08-31 10:37:50
|
---|
54![Synthesising Verified Access Control Systems through Model Checking Nan Zhang, Mark Ryan∗ School of Computer Science University of Birmingham {nxz,mdr}@cs.bham.ac.uk Synthesising Verified Access Control Systems through Model Checking Nan Zhang, Mark Ryan∗ School of Computer Science University of Birmingham {nxz,mdr}@cs.bham.ac.uk](https://www.pdfsearch.io/img/8d6fad3072d027b55eb377007e2a9ae7.jpg) | Add to Reading ListSource URL: www.cs.bham.ac.uk.Language: English - Date: 2009-02-25 10:33:23
|
---|
55![Ellexus Ltd: The I/O Profiling Company Products: We make tools to help you take control of the way you access your data. Industries: Where big compute meets big data! Ellexus Ltd: The I/O Profiling Company Products: We make tools to help you take control of the way you access your data. Industries: Where big compute meets big data!](https://www.pdfsearch.io/img/6080ab49762bcf02d57cc4d75fe2d40e.jpg) | Add to Reading ListSource URL: www.goingarm.com- Date: 2018-01-24 12:00:28
|
---|
56![Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas Robert Bruce Findler Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas Robert Bruce Findler](https://www.pdfsearch.io/img/5e04e4c40368520c327214a33459a061.jpg) | Add to Reading ListSource URL: www.eecs.northwestern.edu- Date: 2016-10-10 16:16:25
|
---|
57![Enabling Advanced and Context-Dependent Access Control in RDF Stores ? Fabian Abel1 , Juri Luca De Coi2 , Nicola Henze1 , Arne Wolf Koesling2 , Daniel Krause1 , Daniel Olmedilla2 Enabling Advanced and Context-Dependent Access Control in RDF Stores ? Fabian Abel1 , Juri Luca De Coi2 , Nicola Henze1 , Arne Wolf Koesling2 , Daniel Krause1 , Daniel Olmedilla2](https://www.pdfsearch.io/img/aecbcb55965c9120ed720cc432ca9bf2.jpg) | Add to Reading ListSource URL: www.olmedilla.info- Date: 2017-02-15 09:32:57
|
---|
58![Policy Privacy in Cryptographic Access Control Anna Lisa Ferrara Georg Fuchsbauer Bin Liu Policy Privacy in Cryptographic Access Control Anna Lisa Ferrara Georg Fuchsbauer Bin Liu](https://www.pdfsearch.io/img/4d9a134c259e8a88613b5f7b0da8900a.jpg) | Add to Reading ListSource URL: epubs.surrey.ac.uk- Date: 2015-07-09 05:51:19
|
---|
59![Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit](https://www.pdfsearch.io/img/f547abfdd8790a5f3ad331a451db9da2.jpg) | Add to Reading ListSource URL: bodden.de- Date: 2017-03-20 03:40:38
|
---|
60![Using Description Logics in Relation Based Access Control Rui Zhang1 , Alessandro Artale2 , Fausto Giunchiglia1 and Bruno Crispo1 1 Faculty of Information Engineering and Using Description Logics in Relation Based Access Control Rui Zhang1 , Alessandro Artale2 , Fausto Giunchiglia1 and Bruno Crispo1 1 Faculty of Information Engineering and](https://www.pdfsearch.io/img/75e134860a73b42f9ad4244da389b859.jpg) | Add to Reading ListSource URL: ceur-ws.org- Date: 2009-07-07 04:46:34
|
---|