Computer networks - Access control.
Overview
Works: | 33 works in 25 publications in 25 languages |
---|
Titles
The hacker's handbook :the strategy behind breaking into and defending networks /
by:
(Language materials, printed)
Transparent user authenticationbiometrics, RFID and behavioural profiling /
by:
(Electronic resources)
Information flow based security control beyond RBACHow to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
by:
(Electronic resources)
Architecting user-centric privacy-as-a-set-of-servicesdigital identity-related privacy framework /
by:
(Electronic resources)
Authentication in insecure environmentsusing visual cryptography and non-transferable credentials in practise /
by:
(Language materials, printed)
Transactions on computational science XXXSpecial Issue on Cyberworlds and Cybersecurity /
by:
(Electronic resources)
Privileged attack vectorsbuilding effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
Contemporary identity and access management architecturesemerging research and opportunities /
by:
(Electronic resources)
Securing the perimeterdeploying identity and access management with free open source software /
by:
(Electronic resources)
Privileged attack vectorsbuilding effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
Visual privacy managementdesign and applications of a privacy-enabling platform /
by:
(Electronic resources)
Show more
Fewer
Subjects