The following pages link to (Q4680552):
Displaying 12 items.
- Read-abortion (RA) based synchronization protocols to prevent illegal information flow (Q494034) (← links)
- Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns (Q884603) (← links)
- A theory of permission based on the notion of derogation (Q975881) (← links)
- Non-linear and non-group cellular automata chaining technique for cryptographic applications (Q988464) (← links)
- Data flow analysis from capability lists, with application to RBAC (Q1621505) (← links)
- Fuzzy role-based access control (Q1944929) (← links)
- Securing the Web of Things with Role-Based Access Control (Q2947063) (← links)
- Access Nets: Modeling Access to Physical Spaces (Q3075481) (← links)
- Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy (Q5056067) (← links)
- (Q5150523) (← links)
- A Typed Language for Events (Q5743588) (← links)
- Delegation in Role-Based Access Control (Q5862522) (← links)