Access control

Results: 10445



#Item
1Ethernet / Security / Computing / Access control / Computer security / Identity management / Perimeter security / Physical security / USB / Door / Power over Ethernet / Network switch

NetAXS Web-based Access Control System Data Sheet

Add to Reading List

Source URL: www.honeywellaccess.com

Language: English - Date: 2015-10-06 12:52:26
2Computing / Software engineering / Computer programming / Programming languages / High-level programming languages / Concurrent programming languages / Java platform / Java / Call stack / Stack / Java Class Library / Go

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:15
3Computational complexity theory / Cryptography / Complexity classes / Theory of computation / NP / IP / Advice / PP / P / Soundness / Commitment scheme / Certificate

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-13 02:26:15
4Computability theory / Models of computation / Theoretical computer science / Software engineering / Scope / Lambda calculus / Computing

Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas Robert Bruce Findler

Add to Reading List

Source URL: www.ece.northwestern.edu

Language: English - Date: 2016-10-10 16:16:25
5Theoretical computer science / Formal methods / Formal verification / Logic in computer science / Frappier / Electronic engineering

Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

Add to Reading List

Source URL: alloytools.org

Language: English - Date: 2018-06-13 06:07:43
6

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-02-25 10:33:24
    7Computing / Computer architecture / Smartphones / System software / Mobile operating systems / Mach / Android / IOS

    AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems Talia Ringer Dan Grossman

    Add to Reading List

    Source URL: sandcat.cs.washington.edu

    Language: English - Date: 2016-09-29 17:15:41
    8

    Before the U.S. COPYRIGHT OFFICE LIBRARY OF CONGRESS In the matter of Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies

    Add to Reading List

    Source URL: www.copyright.gov

    Language: English - Date: 2015-03-30 17:26:19
      9

      Towards Accelerated Usage Control Based on Access Correlations Richard Gay, Jinwei Hu, Heiko Mantel, and Johannes Schickel Department of Computer Science, TU Darmstadt, Germany

      Add to Reading List

      Source URL: www.mais.informatik.tu-darmstadt.de

      Language: English - Date: 2017-11-06 04:54:01
        10

        View Last Accessed Through Grade Center 1. Click on Grade Center from the Control Panel. 2. Click Full Grade Center from the expanded menu 3. Notice the third column of Last Access will list the last date each student lo

        Add to Reading List

        Source URL: blackboardinfo.newark.rutgers.edu

        - Date: 2013-11-01 11:52:20
          UPDATE