Logical access control

Results: 142



#Item
1LOGICAL AND PHYSICAL ACCESS SOLUTIONS  Crescendo® C1150 ƒƒ Higher security – Encryption and data signing protects data-at-rest and enables trusted secure communications. ƒƒ Supports Secure Identity Object™ (SIO)

LOGICAL AND PHYSICAL ACCESS SOLUTIONS Crescendo® C1150 ƒƒ Higher security – Encryption and data signing protects data-at-rest and enables trusted secure communications. ƒƒ Supports Secure Identity Object™ (SIO)

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2013-12-17 10:12:36
2

PDF Document

Add to Reading List

Source URL: www.xiplink.com

Language: English - Date: 2016-07-18 09:51:41
3PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework Michael LeMay, Omid Fatemieh, and Carl A. Gunter University of Illinois at Urbana-Champaign  ABSTRACT

PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework Michael LeMay, Omid Fatemieh, and Carl A. Gunter University of Illinois at Urbana-Champaign ABSTRACT

Add to Reading List

Source URL: seclab.illinois.edu

Language: English - Date: 2011-03-29 12:02:58
    4

    Logical Access Control HPOL#09 Ver1.0

    Add to Reading List

    Source URL: www.cert.gov.lk

    Language: English - Date: 2014-05-12 00:39:34
      5Enabling High-performance NFV for New Generation BRAS Services Telecom service providers are migrating edge, access and CPE networking infrastructure to open, programmable, software-based appliances with network function

      Enabling High-performance NFV for New Generation BRAS Services Telecom service providers are migrating edge, access and CPE networking infrastructure to open, programmable, software-based appliances with network function

      Add to Reading List

      Source URL: www.6wind.com

      Language: English - Date: 2014-04-11 20:43:26
      6λ-RBAC: Programming with Role-Based Access Control Radha Jagadeesan1,? , Alan Jeffrey2,? , Corin Pitcher1?? , and James Riely1,? ? ? 1 2  School of CTI, DePaul University

      λ-RBAC: Programming with Role-Based Access Control Radha Jagadeesan1,? , Alan Jeffrey2,? , Corin Pitcher1?? , and James Riely1,? ? ? 1 2 School of CTI, DePaul University

      Add to Reading List

      Source URL: ect.bell-labs.com

      Language: English - Date: 2010-12-15 21:37:48
      7Logical Methods in Computer Science Volume 00, Number 0, Pages 000–000 SXX λ -RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL RADHA JAGADEESAN, ALAN JEFFREY, CORIN PITCHER, AND JAMES RIELY

      Logical Methods in Computer Science Volume 00, Number 0, Pages 000–000 SXX λ -RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL RADHA JAGADEESAN, ALAN JEFFREY, CORIN PITCHER, AND JAMES RIELY

      Add to Reading List

      Source URL: ect.bell-labs.com

      Language: English - Date: 2010-12-15 21:38:34
      8Bitwise Logical Operations in CA-Visual Objects Patrick Lazzarotto Introduction Systems programming applications require low-level control over and access into the computer’s memory.

      Bitwise Logical Operations in CA-Visual Objects Patrick Lazzarotto Introduction Systems programming applications require low-level control over and access into the computer’s memory.

      Add to Reading List

      Source URL: www.cavo.com

      Language: English
        9Index A access control . . . . . . . . . . 26, 27–31, 32 access restrictions . . . . . . . . . . . . . 27, 79 logical . . . . . . . . . . . . . . . . . 28–29 physical . . . . . . . . . . . . . . . . . . .30

        Index A access control . . . . . . . . . . 26, 27–31, 32 access restrictions . . . . . . . . . . . . . 27, 79 logical . . . . . . . . . . . . . . . . . 28–29 physical . . . . . . . . . . . . . . . . . . .30

        Add to Reading List

        Source URL: c59951.ssl.cf2.rackcdn.com

        Language: English - Date: 2011-12-21 10:01:09
          10How We Use Identifiers and What We Expect Them to be Workshop on Identifier in Future InternetSeoul National University, Korea Keiichi Shima*1, Futoshi Sasaki*2, and Koji Ando*2

          How We Use Identifiers and What We Expect Them to be Workshop on Identifier in Future InternetSeoul National University, Korea Keiichi Shima*1, Futoshi Sasaki*2, and Koji Ando*2

          Add to Reading List

          Source URL: member.wide.ad.jp

          Language: English - Date: 2010-04-06 03:26:50