نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

Journal: :Journal of endodontics 1977
R A Menke F S Weine P S Ulinski M H Smulson

This Thesis is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Master's Theses by an authorized administrator of Loyola eCommons. For more information, please contact [email protected].

Journal: :Annals of clinical laboratory science 1972
E W Bermes H J McDonald

This Dissertation is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Dissertations by an authorized administrator of Loyola eCommons. For more information, please contact [email protected].

2015
Susan K. Green David DePalma Marilynn Brewer

This Dissertation is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Dissertations by an authorized administrator of Loyola eCommons. For more information, please contact [email protected]. David Beacom for assistance and support during the preparation of this dissertation and throughout the writer's graduate career.

Journal: :Journal of Intelligent and Fuzzy Systems 1998
Mohamed B. Trabia William E. McCarthy

This Presentation is brought to you for free and open access by the Mechanical Engineering at Digital Scholarship@UNLV. It has been accepted for inclusion in Presentations (ME) by an authorized administrator of Digital Scholarship@UNLV. For more information, please contact [email protected]. Repository Citation Trabia, M. (2001, May). Design of Fuzzy Logic Controllers for Optimal Perf...

2017
A. V. Radyushkin

This Article is brought to you for free and open access by the Physics at ODU Digital Commons. It has been accepted for inclusion in Physics Faculty Publications by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. Repository Citation Radyushkin, A. V., "Pion Distribution Amplitude and Quasidistributions" (2017). Physics Faculty Pub...

Journal: :Archives internationales de pharmacodynamie et de therapie 1955
B FRIEDMAN Y T OESTER O F DAVIS

This Thesis is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Master's Theses by an authorized administrator of Loyola eCommons. For more information, please contact [email protected].

Journal: :Biochemistry 1962
L J BANASZAK H J McDONALD

This Dissertation is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Dissertations by an authorized administrator of Loyola eCommons. For more information, please contact [email protected].

Journal: :Information & Software Technology 2004
Indrakshi Ray Robert B. France Na Li Geri Georg

Specifying, enforcing and evolving access control policies is essential to prevent security breaches and unavailability of resources. These access control design concerns impose requirements that allow only authorized users to access protected computer-based resources. Addressing these concerns in a design results in the spreading of access control functionality across several design modules. T...

Journal: :Informatica, Lith. Acad. Sci. 2015
Ya-Fen Chang

Abstract. This paper proposes an access control mechanism of verifiable cloud computing services using chameleon hashing and Diffie–Hellman key exchange protocol. By this mechanism, an entity can apply for cloud computing services and he can authorize other users to access granted data or services. When an authorized user or entity wants to access cloud computing services, he can authenticate t...

2009
Wei Rong

Role-Based Access Control, for short RBAC, is a security technology that ensures system resources can not be accessed by non-authorized users. It can be used in network security and works well for grid security as well. Based on the research of RBAC model at present the paper proposes a role-based access control model in grid environment. The model still discusses the issues of role authorizati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید