Search Results for Access control. - Narrowed by: Coding theory.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dAccess$002bcontrol.$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026ic$003dtrue$0026ps$003d300?
2025-12-24T17:45:12Z
Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)
ent://SD_ILS/0/SD_ILS:198953
2025-12-24T17:45:12Z
2025-12-24T17:45:12Z
Author Fischer-Hellmann, Klaus-Peter. author. Bischoff, Rainer. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ubiquitous Computing Application and Wireless Sensor UCAWSN-14
ent://SD_ILS/0/SD_ILS:530612
2025-12-24T17:45:12Z
2025-12-24T17:45:12Z
Author Park, James J. (Jong Hyuk). editor. Pan, Yi. editor. Chao, Han-Chieh. editor. Yi, Gangman. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-94-017-9618-7">https://doi.org/10.1007/978-94-017-9618-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>