Font Size: a A A
Keyword [RBAC access control]
Result: 21 - 36 | Page: 2 of 2
21. Pki + Of Rbac With The Permission Of The Characteristics Of The Fast Table-based Design And Realization
22. Two Rbac-based Access Control Model And Applied Research
23. Helping The Vulnerable To Help The Loan-to-system Research And Implementation Of Open Source Architecture Colleges And Universities Based On Ssh
24. Based Ssh Colleges And Universities The Appraised Award System
25. Improvement And Application Of RBAC Access Control Method
26. The Research And Implementation Of A Access Control Model Based On Attribute And RBAC
27. Research And Application Of Access Matrix And RBAC Access Control Model
28. Design And Implementation Of E-government System’s Access Control Based On RBAC
29. Grid Portal Research Security Technology
30. Research On Authentication Protocol Of RFID Based On Multi-Level Security Policy
31. Research And Application Of Access Control In B/S Applications Based On SSH
32. Design And Implementation Of RBAC Access Control Model Based On B/S Architecture
33. Design And Development Of A Quality Management Information System For A Large Pressure Vessel Manufacturing Enterprise
34. Role-based Hybrid Access Control Models In Cloud Computing
35. Incremental analysis of Role Based Access Control policies
36. The RCL 2000 language for specifying role-based authorization constraints
  <<First  <Prev  Next>  Last>>  Jump to