• Login
    Browsing School of Computer Science and Informatics by Subject 
    •   DORA Home
    • Faculty of Computing, Engineering and Media
    • School of Computer Science and Informatics
    • Browsing School of Computer Science and Informatics by Subject
    •   DORA Home
    • Faculty of Computing, Engineering and Media
    • School of Computer Science and Informatics
    • Browsing School of Computer Science and Informatics by Subject
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing School of Computer Science and Informatics by Subject "access control"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-3 of 3

    • title
    • publication date
    • submission date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • A Cloud-based Architecture for Mitigating Privacy Issues in Online Social Networks 

        Kaiiali, Mustafa; Iliyasu, Auwal; Wazan, Ahmad; Habbal, Adib; Muhammad, Yusuf (Article)
        Online social media networks have revolutionized the way information is shared across our societies and around the world. Information is now delivered for free to a large audience within a short period of time. Anyone can ...
      • Dynamic Access Control Policies - Specification and Verification 

        Janicke, Helge; Cau, A. (Antonio); Siewe, Francois; Zedan, Hussein (Article)
        Security requirements deal with the protection of assets against unauthorized access (disclosure or modification) and their availability to authorized users. Temporal constraints of history-based access control policies ...
      • Modelling and Analysis of Corporate Efficiency and Productivity Loss Associated with Enterprise Information Security Technologies 

        Wen, Zeng; Maciej, Koutny (Article)
        By providing effective access control mechanisms, enterprise information security technologies have been proven successful in protecting the sensitive information in business organizations. However, such security mechanisms ...

        Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
        DMU LIbrary
         

         

        Browse

        All of DORACommunities & CollectionsAuthorsTitlesSubjects/KeywordsResearch InstituteBy Publication DateBy Submission DateThis CollectionAuthorsTitlesSubjects/KeywordsResearch InstituteBy Publication DateBy Submission Date

        My Account

        Login

        Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
        DMU LIbrary