Font Size: a A A
Keyword [access control constraint]
Result: 1 - 6 | Page: 1 of 1
1. The Construction Of Role Based Access Control Policy
2. Research And Implementation On A Constraint-Based Access Control Model
3. Research And Application Of Access Control And Authorization Constraint Based On Workflow
4. Similar User Cluster And Risky Permission Set Based Access Control
5. Research On Access Control And Access Control Constraint Based On Ciphertext-policy Attribute-based Encryption
6. LSSS Access Structure CP-ABE With Sensitive Attributes Hidden
  <<First  <Prev  Next>  Last>>  Jump to