Computer networks - Access control.
Overview
Works: | 36 works in 26 publications in 26 languages |
---|
Titles
Biometrics : = identity verification in a networked world : a Wiley tech brief /
by:
(Language materials, printed)
Transactions on computational science XXX = Special Issue on Cyberworlds and Cybersecurity /
by:
(Electronic resources)
Visual privacy management = design and applications of a privacy-enabling platform /
by:
(Electronic resources)
Digital identity and access management = technologies and frameworks /
by:
(Language materials, printed)
Contemporary identity and access management architectures = emerging research and opportunities /
by:
(Electronic resources)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
Information flow based security control beyond RBAC = How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
by:
(Electronic resources)
Architecting user-centric privacy-as-a-set-of-services = digital identity-related privacy framework /
by:
(Electronic resources)
Authentication in insecure environments = using visual cryptography and non-transferable credentials in practise /
by:
(Electronic resources)
Penetration testing basics = a quick-start guide to breaking into systems /
by:
(Electronic resources)
Show more
Fewer
Subjects