Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
3712
search results - page 165 / 743
»
Role-Based Access Control
Sort
relevance
views
votes
recent
update
View
thumb
title
117
Voted
JCM
2007
122
views
more
JCM 2007
»
Petri Net Based Controller Concept For Cognitive Radios in Wireless Access Networks
15 years 1 months ago
Download
www.academypublisher.com
—This paper will give a detailed discussion about the authors view on Software Defined and Cognitive Radio.
Alexander Vießmann, Admir Burnic, Christoph ...
claim paper
Read More »
86
Voted
JCST
2007
83
views
more
JCST 2007
»
CSchema: A Downgrading Policy Language for XML Access Control
15 years 1 months ago
Download
www.ipl.t.u-tokyo.ac.jp
Dong-Xi Liu
claim paper
Read More »
69
click to vote
CN
2000
73
views
more
CN 2000
»
Design and implementation of an access control processor for XML documents
15 years 1 months ago
Download
www.pardise.net
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
claim paper
Read More »
113
Voted
CONCURRENCY
2000
96
views
more
CONCURRENCY 2000
»
Providing fine-grained access control for Java programs via binary editing
15 years 1 months ago
Download
www.cs.ucdavis.edu
Raju Pandey, Brant Hashii
claim paper
Read More »
83
click to vote
COMPSEC
2002
92
views
more
COMPSEC 2002
»
A practical key management scheme for access control in a user hierarchy
15 years 1 months ago
Download
www.cse.buffalo.edu
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
claim paper
Read More »
« Prev
« First
page 165 / 743
Last »
Next »