Uploads
Contact
/
Login
Upload
Search Results for '1 Provenance Based Access Control Pbac'
An Overview of Data Provenance
calandra-battersby
Using Well-Founded Provenance
alexa-scheidler
Cyber Risk: What You Should Be Asking IT
alida-meadow
Update Exchange with
alexa-scheidler
Define Program Budget Advisory Committee
olivia-moreira
Querying Workflow Provenance
giovanna-bartolotta
Open Provenance Model Tutorial
celsa-spraggs
Collaborative Data Sharing with Mappings and Provenance
olivia-moreira
SDNKeeper: Lightweight Resource Protection and Management System for SDN-based Cloud
marina-yarberry
Secure Network Provenance
aaron
1 Future of Access Control:
luanne-stotts
1 DAC and MAC Prof . Ravi Sandhu
pasty-toler
Access Control Weighing the Pros and Cons
luanne-stotts
Access Control Rules Tester
pamella-moone
Research on access control
giovanna-bartolotta
Asian Art Provenance:
pasty-toler
S&I Data Provenance Initiative
calandra-battersby
L 1 - Answer based on provenance only [1]
phoebe-click
Access Control for Online Social Networks using Relationship Type Patterns
pamella-moone
Role-Based Access Control for
lois-ondreau
Contextual, Flow-Based Access Control with
ellena-manuel
Query Language Constructs for Provenance
mitsue-stanley
On Data Provenance in Group-centric Secure Collaboration
celsa-spraggs
Identity and Access and Cloud:
briana-ranney
1
2
3
4
5
6
7