<--- Back to Details
First PageDocument Content
Human–computer interaction / Radio-frequency identification / Access control / Electronic toll collection / Ubiquitous computing / Roper Industries / Gated community / Automatic number plate recognition / Toll road / Automatic identification and data capture / Security / Technology
Date: 2013-10-07 12:50:59
Human–computer interaction
Radio-frequency identification
Access control
Electronic toll collection
Ubiquitous computing
Roper Industries
Gated community
Automatic number plate recognition
Toll road
Automatic identification and data capture
Security
Technology

PARKING_Gated Communities_Profile 2012:Layout 1

Add to Reading List

Source URL: www.controlledproducts.com

Download Document from Source Website

File Size: 1.007,76 KB

Share Document on Facebook

Similar Documents

Ethernet / Security / Computing / Access control / Computer security / Identity management / Perimeter security / Physical security / USB / Door / Power over Ethernet / Network switch

NetAXS Web-based Access Control System Data Sheet

DocID: 1xVj6 - View Document

Computing / Software engineering / Computer programming / Programming languages / High-level programming languages / Concurrent programming languages / Java platform / Java / Call stack / Stack / Java Class Library / Go

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

DocID: 1xUqk - View Document

Computational complexity theory / Cryptography / Complexity classes / Theory of computation / NP / IP / Advice / PP / P / Soundness / Commitment scheme / Certificate

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

DocID: 1xUdf - View Document

Computability theory / Models of computation / Theoretical computer science / Software engineering / Scope / Lambda calculus / Computing

Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas Robert Bruce Findler

DocID: 1xU35 - View Document

Theoretical computer science / Formal methods / Formal verification / Logic in computer science / Frappier / Electronic engineering

Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

DocID: 1xTC8 - View Document