IEEE Access

Results: 1545



#Item
181

Submitted to the 2004 IEEE Symposium on Security and Privacy, Oakland, CA 2004 The Practical Application of a Decidable Access Model SRL Technical Report SRL

Add to Reading List

Source URL: srl.cs.jhu.edu

- Date: 2007-09-20 09:41:43
    182

    User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems

    Add to Reading List

    Source URL: www.ieee-security.org

    - Date: 2012-05-22 01:33:56
      183

      Semantic Comparison of Security Policies: From Access Control Policies to Flow Properties

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2012-06-05 18:18:54
        184

        Instituto Tecnológico e Nuclear Biblioteca Científica Digital Link: www.ieeexplore.ieee.org Escolhendo a Opção “What can I Access” – Indica aos utilizadores o que permite o acesso

        Add to Reading List

        Source URL: www.itn.pt

        Language: Portuguese - Date: 2012-07-06 07:43:55
          185

          2011 IEEE Symposium on Security and Privacy Verification of Information Flow and Access Control Policies with Dependent Types Aleksandar Nanevski Anindya Banerjee IMDEA Software Institute

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2011-04-10 18:06:54
            186

            2011 IEEE Symposium on Security and Privacy Cache Games – Bringing Access-Based Cache Attacks on AES to Practice David Gullasch Bern University of Applied Sciences,

            Add to Reading List

            Source URL: ieee-security.org

            Language: English - Date: 2011-04-10 18:07:08
              187Evaluation / Security / Wireless security / Common Criteria / Protection Profile / IEEE 802.1X / RADIUS / Wireless access point / Evaluation Assurance Level / Computer network security / Computer security / Computing

              Motorola WS5100 Wireless Switch and RFS7000 RF Switch Security Target Version 1.5 Motorola WS5100 Wireless Switch and RFS7000 RF Switch Security Target

              Add to Reading List

              Source URL: sertit.no

              Language: English - Date: 2013-09-19 06:43:39
              188Data / IEEE standards / Data transmission / Ethernet / Token ring / Time division multiple access / Contention / Network packet / Telecommunication / Information / Media Access Control / Computing

              A TYPICAL local a k a network (LAN)todayhasthe following characteristics: Transmits bits serially rather than in parallel.

              Add to Reading List

              Source URL: www.signallake.com

              Language: English - Date: 2013-03-16 17:12:40
              189Computer security / Access control / Identity management / Operating system / Kernel / Ring / Android / Malware / Google Chrome / Software / Computing / Cloud clients

              User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems

              Add to Reading List

              Source URL: ieee-security.org

              Language: English - Date: 2012-05-22 01:33:56
              190Channel / Mathematics / Orthogonality / Information / Network theory / Telecommunications engineering / Media Access Control / Information theory / Channel access method

              Multi-Level Orthogonal Hopping Rendezvous Jens P. Elsner, Student Member, IEEE, Hosung Park, Student Member, IEEE, Jeonghoon Mo, Member, IEEE, Friedrich K. Jondral, Senior Member, IEEE t

              Add to Reading List

              Source URL: www.cel.kit.edu

              Language: English - Date: 2012-05-30 01:08:13
              UPDATE