• Login
    Browsing School of Computer Science and Informatics by Subject 
    •   DORA Home
    • Faculty of Computing, Engineering and Media
    • School of Computer Science and Informatics
    • Browsing School of Computer Science and Informatics by Subject
    •   DORA Home
    • Faculty of Computing, Engineering and Media
    • School of Computer Science and Informatics
    • Browsing School of Computer Science and Informatics by Subject
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing School of Computer Science and Informatics by Subject "Access control"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-3 of 3

    • title
    • publication date
    • submission date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Designing a Secure Exam Management System (SEMS) for M-Learning Environments 

        Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc (Article)
        M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi ...
      • Improving Security in Bring Your Own Device (BYOD) Environment by Controlling Access 

        Muhammad, M.A.; Zadeh, P.B.; Ayesh, Aladdin, 1972- (Conference)
        With the rapid increase in smartphones and tablets, Bring Your Own Devices (BYOD) has simplified computing by introducing the use of personally owned devices. These devices can be utilised in accessing business enterprise ...
      • Towards the Modelling of Secure Pervasive Computing Systems: A Paradigm of Context-Aware Secure Action System 

        Siewe, Francois (Article)
        The design of security-critical pervasive systems is challenging due to that security constraints are often highly dependent on dynamically changing contexts. To increase the trustworthiness of pervasive systems, a dependable ...

        Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
        DMU LIbrary
         

         

        Browse

        All of DORACommunities & CollectionsAuthorsTitlesSubjects/KeywordsResearch InstituteBy Publication DateBy Submission DateThis CollectionAuthorsTitlesSubjects/KeywordsResearch InstituteBy Publication DateBy Submission Date

        My Account

        Login

        Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
        DMU LIbrary