Access control

Results: 10445



#Item
1NetAXS Web-based Access Control System Data Sheet

NetAXS Web-based Access Control System Data Sheet

Add to Reading List

Source URL: www.honeywellaccess.com

Language: English - Date: 2015-10-06 12:52:26
2Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer  SIT, Email: philipp.holzinger@sit

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:15
3Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-05-13 02:26:15
4Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas  Robert Bruce Findler

Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas Robert Bruce Findler

Add to Reading List

Source URL: www.ece.northwestern.edu

Language: English - Date: 2016-10-10 16:16:25
5Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

Add to Reading List

Source URL: alloytools.org

Language: English - Date: 2018-06-13 06:07:43
6Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-02-25 10:33:24
    7AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems Talia Ringer Dan Grossman

    AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems Talia Ringer Dan Grossman

    Add to Reading List

    Source URL: sandcat.cs.washington.edu

    Language: English - Date: 2016-09-29 17:15:41
    8Before the U.S. COPYRIGHT OFFICE LIBRARY OF CONGRESS In the matter of Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies

    Before the U.S. COPYRIGHT OFFICE LIBRARY OF CONGRESS In the matter of Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies

    Add to Reading List

    Source URL: www.copyright.gov

    Language: English - Date: 2015-03-30 17:26:19
      9Towards Accelerated Usage Control Based on Access Correlations Richard Gay, Jinwei Hu, Heiko Mantel, and Johannes Schickel Department of Computer Science, TU Darmstadt, Germany

      Towards Accelerated Usage Control Based on Access Correlations Richard Gay, Jinwei Hu, Heiko Mantel, and Johannes Schickel Department of Computer Science, TU Darmstadt, Germany

      Add to Reading List

      Source URL: www.mais.informatik.tu-darmstadt.de

      Language: English - Date: 2017-11-06 04:54:01
        10View Last Accessed Through Grade Center 1. Click on Grade Center from the Control Panel. 2. Click Full Grade Center from the expanded menu 3. Notice the third column of Last Access will list the last date each student lo

        View Last Accessed Through Grade Center 1. Click on Grade Center from the Control Panel. 2. Click Full Grade Center from the expanded menu 3. Notice the third column of Last Access will list the last date each student lo

        Add to Reading List

        Source URL: blackboardinfo.newark.rutgers.edu

        - Date: 2013-11-01 11:52:20