Font Size: a A A
Keyword [Security access]
Result: 1 - 20 | Page: 1 of 10
1. Research On Access Control Technologies In Cloud Computing Environment
2. Study On Temporal Role Delegation Graph Model And Its Analysis
3. Study On Attribute Restricted Delegation Model In Role Based Access Control (RBAC)
4. Research On Key Issues In Network-Centric Geometric Modeling
5. Study On Several Problems Of Workflow Security And Access Control
6. The Resources' Description And Security Access In Grid Environments
7. Research On Key Techniques Of Information Security In Electric Power Information System
8. Research On The Information Security Technology In Networked Sharing Of The Manufacturing Equipment
9. Digital Signature Theory And Its Applications In Digital Rights Management System
10. Research On The Efficient Methods In Protecting Data Of Networked Storage System
11. The Research Of Access Control Model Based On EUCON
12. The Linux-based Secure Operating System Research
13. The Timed RBAC
14. Research And Implementation On A Constraint-Based Access Control Model
15. Study And Design On Security Of Data Warehouse In SZDSS
16. Research On Access Control Technology For Enterprise Application Software And Implementation
17. The Research Of AOP And Access Control
18. Application Research Of Host-based Access Control In Inner Network
19. Research On Access Control Model In P2P Network
20. Research Of Unitive Security Pattern & RBAC Technology In Recombinating Manufacture Resource
  <<First  <Prev  Next>  Last>>  Jump to