Search Results for Access control. - Narrowed by: Computer science. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dAccess$002bcontrol.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2026-03-14T18:03:37Z Adaptive Cryptographic Access Control ent://SD_ILS/0/SD_ILS:172654 2026-03-14T18:03:37Z 2026-03-14T18:03:37Z Author&#160;Kayem, Anne V. D. M. author.&#160;Akl, Selim G. author.&#160;Martin, Patrick. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-6655-1">http://dx.doi.org/10.1007/978-1-4419-6655-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Medium Access Control in Wireless Networks ent://SD_ILS/0/SD_ILS:332073 2026-03-14T18:03:37Z 2026-03-14T18:03:37Z Author&#160;Wang, Ping. author.&#160;Zhuang, Weihua. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332073.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6602-4">http://dx.doi.org/10.1007/978-1-4614-6602-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Flow Based Security Control Beyond RBAC How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) ent://SD_ILS/0/SD_ILS:198953 2026-03-14T18:03:37Z 2026-03-14T18:03:37Z Author&#160;Fischer-Hellmann, Klaus-Peter. author.&#160;Bischoff, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-2618-3">http://dx.doi.org/10.1007/978-3-8348-2618-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Access Control Systems Security, Identity Management and Trust Models ent://SD_ILS/0/SD_ILS:165433 2026-03-14T18:03:37Z 2026-03-14T18:03:37Z Author&#160;Benantar, Messaoud. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:610857 2026-03-14T18:03:37Z 2026-03-14T18:03:37Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Peyrin, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70700-6">https://doi.org/10.1007/978-3-319-70700-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:613551 2026-03-14T18:03:37Z 2026-03-14T18:03:37Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Peyrin, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70694-8">https://doi.org/10.1007/978-3-319-70694-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2017 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:618157 2026-03-14T18:03:37Z 2026-03-14T18:03:37Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Peyrin, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70697-9">https://doi.org/10.1007/978-3-319-70697-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Software and Systems 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings ent://SD_ILS/0/SD_ILS:618015 2026-03-14T18:03:37Z 2026-03-14T18:03:37Z Author&#160;Caballero, Juan. editor.&#160;Bodden, Eric. editor.&#160;Athanasopoulos, Elias. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-30806-7">https://doi.org/10.1007/978-3-319-30806-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>