Search Results for Access control. - Narrowed by: Coding theory. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dAccess$002bcontrol.$0026qf$003dSUBJECT$002509Subject$002509Coding$002btheory.$002509Coding$002btheory.$0026ic$003dtrue$0026ps$003d300? 2025-12-24T17:45:12Z Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) ent://SD_ILS/0/SD_ILS:198953 2025-12-24T17:45:12Z 2025-12-24T17:45:12Z Author&#160;Fischer-Hellmann, Klaus-Peter. author.&#160;Bischoff, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ubiquitous Computing Application and Wireless Sensor UCAWSN-14 ent://SD_ILS/0/SD_ILS:530612 2025-12-24T17:45:12Z 2025-12-24T17:45:12Z Author&#160;Park, James J. (Jong Hyuk). editor.&#160;Pan, Yi. editor.&#160;Chao, Han-Chieh. editor.&#160;Yi, Gangman. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-94-017-9618-7">https://doi.org/10.1007/978-94-017-9618-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>