-
121
Research on formal description and verification of automated trust negotiation
Published 2011-01-01Subjects: “…access control…”
Get full text
Article -
122
Automatic generation of AppArmor security policies based on large language models
Published 2024-06-01Subjects: “…mandatory access control…”
Get full text
Article -
123
Attribute-based encryption scheme with efficient revocation in data outsourcing systems
Published 2015-10-01Subjects: Get full text
Article -
124
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
Published 2021-05-01Subjects: “…biometrics (access control)…”
Get full text
Article -
125
Representation model of structured document for multilevel security
Published 2012-09-01Subjects: Get full text
Article -
126
Collision resolution algorithm based on time-series forecasting for cognitive wireless networks
Published 2011-11-01Subjects: Get full text
Article -
127
Security sharing scheme for encrypted data in cloud storage
Published 2015-10-01Subjects: Get full text
Article -
128
An exploratory study of interpretability for face presentation attack detection
Published 2021-07-01Subjects: “…biometrics (access control)…”
Get full text
Article -
129
Optimization and Security Analysis of Interconnected Security Control Based on Semantic of Process Communication
Published 2021-09-01Subjects: Get full text
Article -
130
Blockchain-based distributed EHR fine-grained traceability scheme
Published 2021-05-01Subjects: Get full text
Article -
131
Bayes decision theory based risk minimization authorization mapping
Published 2015-11-01Subjects: “…access control…”
Get full text
Article -
132
ESX: A Self-Generated Control Policy for Remote Access With SSH Based on eBPF
Published 2025-01-01Subjects: “…Access control…”
Get full text
Article -
133
Basic finger inner‐knuckle print: A new hand biometric modality
Published 2021-01-01Subjects: “…biometrics (access control)…”
Get full text
Article -
134
Ciphertext policy attribute-based encryption scheme supporting direct revocation
Published 2016-05-01Subjects: Get full text
Article -
135
Application of the Extension RBAC Model in the Family Open Platform
Published 2015-11-01Subjects: Get full text
Article -
136
Quantum secure patient login credential system using blockchain for electronic health record sharing framework
Published 2025-02-01Subjects: Get full text
Article -
137
Producing secure multimodal biometric descriptors using artificial neural networks
Published 2021-03-01Subjects: “…biometrics (access control)…”
Get full text
Article -
138
Study on a cooperative MAC protocol with priority-based contention for wireless networks
Published 2011-01-01Subjects: “…cooperative medium access control…”
Get full text
Article -
139
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
Published 2025-01-01Subjects: “…Role-based access control…”
Get full text
Article -
140
Multi-channel MAC protocol based on network partitioning for wireless sensor networks
Published 2014-11-01Subjects: Get full text
Article