Books on the topic 'Time based access control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Time based access control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Zhang, Rui. Relation based access control. Heidelberg: AKA, 2010.
Find full textFerraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.
Find full textFerraiolo, David. Role-based access controls. Boston: Artech House, 2003.
Find full textYuen, Clement. Rate control with pricing in contention-based access networks. Ottawa: National Library of Canada, 2002.
Find full textKogan, Konstantin, and Eugene Khmelnitsky. Scheduling: Control-Based Theory and Polynomial-Time Algorithms. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4675-7.
Full textKogan, Konstantin. Scheduling: Control-based theory and polynomial-time algorithms. Dordrecht: Kluwer Academic Publishers, 2000.
Find full textHendrick, Thomas E. Purchasing's contributions to time-based strategies. Tempe, Ariz: Center for Advanced Purchasing Studies, 1994.
Find full textLarson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Find full textLarson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Find full textLarson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Find full textMehta, Axaykumar, and Bijnan Bandyopadhyay. Frequency-Shaped and Observer-Based Discrete-time Sliding Mode Control. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2238-5.
Full textL, Wilson C. Simple test procedure for image-based biometric verification systems. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textControl system design based on exact model matching techniques. Berlin: Springer-Verlag, 1985.
Find full textCredeur, Leonard. Simulation evaluation of TIMER, a time-based terminal air traffic, flow-management concept. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Division, 1989.
Find full text802.1X port-based authentication. Boca Raton: Auerbach, 2007.
Find full textBrown, Edwin Lyle. 802.1X Port-Based Authentication. London: Taylor and Francis, 2006.
Find full textSun, Qi-zhi. Knowledge-based interactive real-time control system in product-focused manufacturing environment. Portsmouth: Portsmouth Polytechnic, Business School, 1991.
Find full textKang, Shu Gang, and Shiu Hong Choi. Multi-Agent Based Beam Search for Real-Time Production Scheduling and Control. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4576-9.
Full textKnox, Charles E. Ground-based time-guidance algorithm for control of airplanes in a time-metered air traffic control environment: A piloted simulation study. Hampton, Va: Langley Research Center, 1986.
Find full textMichiels, W. Stability and stabilization of time-delay systems: An Eigenvalue-based approach. Philadelphia: Society for Industrial and Applied Mathematics, 2007.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control. and Technische Universität Berlin, eds. Proceedings, Fifth ACM Workshop on Role-Based Access Control: Berlin, Germany, July 26-27, 2000. New York, N.Y: ACM, 2000.
Find full textWilliams, David H. Airborne four-dimensional flight management in a time-based air traffic control environment. Hampton, Va: Langley Research Center, 1991.
Find full textHo, Tan-Jan. The control of real-time discrete-event systems subject to predicate-based constraints. Ottawa: National Library of Canada = Bibliothèque nationale du Canada, 1997.
Find full textWilliams, David H. Airborne four-dimensional flight management in a time-based air traffic control environment. [Washington, D.C.]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Division, 1991.
Find full textCredeur, Leonard. Final-approach spacing aids (FASA) evaluation for terminal-area, time-based air traffic control. Hampton, Va: Langley Research Center, 1993.
Find full textACM, Workshop on Role-Based Access Control (3rd 1998 Fairfax Va ). Proceedings: Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 22-23, 1998. New York, N.Y: ACM, 1998.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control., Association for Computing Machinery. Washington, D.C. Chapter., National Institute of Standards and Technology (U.S.), and George Mason University, eds. Proceedings, Fourth ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, October 28-29, 1999. New York, N.Y: ACM, 1999.
Find full textACM Workshop on Role-Based Access Control (4th 1999 Fairfax, Virginia, USA). Proceedings: Fourth ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 28-29, 1999. New York: Association for Computing Machinery, 1999.
Find full textACM, Workshop on Role-Based Access Control (2nd 1997 Fairfax Virginia). Proceedings Second ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, November 6-7, 1997. New York: ACM, 1997.
Find full textGuide to claims-based identity and access control: Authentication and authorization for services and the web. [Redmond, Wash.]: Microsoft Press, 2010.
Find full textACM Workshop on Role-Based Access Control (2nd 1997 Fairfax, Va.). Proceedings: Second ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, November 6-7, 1997. New York: Association for Computing Machinery, 1997.
Find full textDas, Swagata, Devashree Tripathy, and Jagdish Lal Raheja. Real-Time BCI System Design to Control Arduino Based Speed Controllable Robot Using EEG. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-3098-8.
Full textACM Workshop on Role-Based Access Control (1st 1995 Gaithersburg, Md.). Proceedings--First ACM Workshop on Role-Based Access Control: Gaithersburg, Maryland, USA, 30 November - 1 December 1995. New York, N.Y: Association for Computing Machinery, 1995.
Find full textBranscomb, Anne W. Rogue computer program-- viruses, worms, Trojan horses, and time bombs: Prank, prowess, protection or prosecution? Cambridge, Mass: Program on Information Resources Policy, Harvard University, Center for Information Policy Research, 1989.
Find full textJoachim, Deutscher, ed. Design of observer-based compensators: From the time to the frequency domain. Dordrecht: Springer, 2009.
Find full textAttribute-Based Access Control. Artech House, 2017.
Find full textFerraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control. Artech House Publishers, 2003.
Find full textFerraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control, Second Edition. 2nd ed. Artech House Publishers, 2007.
Find full textAttribute-Based Encryption and Access Control. Taylor & Francis Group, 2020.
Find full textYan, Zhu, Dijiang Huang, and Qiuxiang Dong. Attribute-Based Encryption and Access Control. Taylor & Francis Group, 2020.
Find full textYan, Zhu, Dijiang Huang, and Qiuxiang Dong. Attribute-Based Encryption and Access Control. Taylor & Francis Group, 2020.
Find full textZhu, Yan, Dijiang Huang, and Qiuxiang Dong. Attribute-Based Encryption and Access Control. Taylor & Francis Group, 2020.
Find full textElli, Kartsakli, ed. Contention-based collision-resolution medium access control algorithms. New York: Nova Science Publishers, 2009.
Find full textA revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textElli, Kartsakli, ed. Contention-based collision-resolution medium access control algorithms. New York: Nova Science Publishers, 2009.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full textNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Find full text