Search Results - "access control"

Refine Results
  1. 1

    Access Controlled : The Shaping of Power, Rights, and Rule in Cyberspace /

    Published 2010
    Table of Contents: “…Beyond denial : introducing next-generation information access controls / Ronald Deibert and Rafal Rohozinski -- Control and subversion in Russian cyberspace / Ronald Deibert and Rafal Rohozinski -- The EU data retention directive in an era of Internet surveillance / Hal Roberts and John Palfrey -- Barriers to cooperation : an analysis of the origins of international efforts to protect children online / Nart Villeneuve -- Intermediary censorship / Ethan Zuckerman -- Protecting privacy and expression online : can the Global Network Initiative embrace the character of the Net? …”
    Full text available:
    Electronic eBook
  2. 2

    Electronic access control by Norman, Thomas P.

    Published 2012
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 3

    Role-based access control by Ferraiolo, David

    Published 2003
    Subjects: “…Computers Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 4
  5. 5

    Role-based access control by Ferraiolo, David

    Published 2007
    Subjects: “…Computer networks Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 6

    Best practices in government information a global perspective /

    Published 2008
    Subjects: “…Government information Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7

    Competitive political regime and Internet control : case studies of Malaysia, Thailand and Indonesia / by Yangyue, Liu

    Published 2014
    Subjects: “…Internet Access control Government policy Malaysia.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 8
  9. 9

    Relation based access control / by Zhang, Rui

    Published 2010
    Subjects: “…Computers Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 10

    Role mining in business taming role-based access control administration / by Colantonio, Alessandro

    Published 2012
    Subjects: “…Computer networks Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 11

    Deployment guide series IBM Tivoli Security Compliance Manager / by Bücker, Axel

    Published 2005
    Subjects: “…Business enterprises Computer networks Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 12
  13. 13

    Security assessment case studies for implementing the NSA lAM / by Rogers, Russ

    Published 2004
    Subjects: “…Computers Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 14
  15. 15

    Instant Metasploit starter by Ranganath, Karthik

    Published 2013
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 16
  17. 17

    Attribute-Based Encryption and Access Control by Huang, Dijiang

    Published 2020
    Table of Contents: “…Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Authors -- Contributors -- Part I: Foundations of Attribute-Based Encryption for Attribute-Based Access Control -- Chapter 1: Foundations of Attribute-Based Encryption -- 1.1 Attribute-Based Access Control-An ABE Approach -- 1.1.1 Motivation of ABE-Based Attribute-Based Access Control -- 1.1.2 Potentials and Issues of ABAC -- 1.2 Mathematical Background -- 1.2.1 Group and Cyclic Group -- 1.2.2 Prime-Order Bilinear Pairing -- 1.2.3 Composite-Order Bilinear Pairing…”
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  18. 18
  19. 19
  20. 20