<--- Back to Details
First PageDocument Content
Cybernetics / Science / Computer security / Control engineering / Hacking / Access control / Cyberwarfare / Controller / Control system / Technology / Security / Automation
Date: 2015-05-11 16:42:47
Cybernetics
Science
Computer security
Control engineering
Hacking
Access control
Cyberwarfare
Controller
Control system
Technology
Security
Automation

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 523,97 KB

Share Document on Facebook

Similar Documents

Ethernet / Security / Computing / Access control / Computer security / Identity management / Perimeter security / Physical security / USB / Door / Power over Ethernet / Network switch

NetAXS Web-based Access Control System Data Sheet

DocID: 1xVj6 - View Document

Computing / Software engineering / Computer programming / Programming languages / High-level programming languages / Concurrent programming languages / Java platform / Java / Call stack / Stack / Java Class Library / Go

Hardening Java’s Access Control by Abolishing Implicit Privilege Elevation Philipp Holzinger∗ , Ben Hermann† , Johannes Lerch† , Eric Bodden‡ and Mira Mezini† ∗ Fraunhofer SIT, Email: philipp.holzinger@sit

DocID: 1xUqk - View Document

Computational complexity theory / Cryptography / Complexity classes / Theory of computation / NP / IP / Advice / PP / P / Soundness / Commitment scheme / Certificate

Monotone Batch NP-Delegation with Applications to Access Control Zvika Brakerski∗ Yael Tauman Kalai†

DocID: 1xUdf - View Document

Computability theory / Models of computation / Theoretical computer science / Software engineering / Scope / Lambda calculus / Computing

Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas Robert Bruce Findler

DocID: 1xU35 - View Document

Theoretical computer science / Formal methods / Formal verification / Logic in computer science / Frappier / Electronic engineering

Validating SGAC Access Control Policies with Alloy and ProB Nghi Huynh, Marc Frappier, Amel Mammar and R´egine Laleau FA 2018, April 30th

DocID: 1xTC8 - View Document