-
1
-
2
-
3
Big Data Handling Approach for Unauthorized Cloud Computing Access
Published 2022-01-01Get full text
Article -
4
Text and Data Mining: Negotiating Computational Access to Library Resources
Published 2024Get full text
Article -
5
TC-enabled and distributed cloud computing access control model
Published 2014“…In other words, cloud computing access control requires establishing a trust between users, service provider and provided services in a scalable manner. …”
Article -
6
-
7
Automated transfer of information from paper documents to computer-accessible media
Published 2009Get full text
Working Paper -
8
-
9
-
10
Computational access point selection based on resource allocation optimization to reduce the edge computing latency
Published 2022-12-01Subjects: Get full text
Article -
11
An XML-based model for integrating and managing label-based access control of heterogeneous legacy databases [microfilm] /
Published 2006Subjects: “…Computers -- Access control…”
-
12
Less Computer Access: Is It a Risk or a Protective Factor for Cyberbullying and Face-to-Face Bullying Victimization among Adolescents in the United States?
Published 2023-10-01“…The present study investigates whether less computer access is associated with an increase or decrease in cyberbullying and face-to-face bullying victimization. …”
Get full text
Article -
13
-
14
Access control framework in a bring your own device environment
Published 2016Subjects: Get full text
Thesis -
15
Key management to achieve security for financial institutions engaged in financial transactions (wholesale)
Published 1990Subjects: “…Computers-Access control…”
-
16
Security management in communications systems : everything you've always wanted to know about public-key cryptosystems.
Published 2005Subjects: Get full text
Thesis -
17
An improved binary method for scalar multiplication in elliptic curve cryptography
Published 2010Subjects: Get full text
Article -
18
Efficient XML queries and updates encoding scheme in the presence of access control using fractional numbers
Published 2013Subjects: Get full text
Thesis -
19
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015Subjects: Get full text
Thesis -
20
Personal identification by Keystroke Pattern for login security
Published 2001Subjects: “…Computers - Access control - Keystroke timing authentication.…”
Get full text
Thesis