Gotowa bibliografia na temat „RBAC”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „RBAC”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "RBAC"
Wang, Zhen Wu. "A Flexible Role Based Access Control Engine Model." Advanced Materials Research 403-408 (November 2011): 2477–80. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2477.
Pełny tekst źródłaEditorial Office, OBM Integrative and Complementary Medicine. "An Interview with Dr. Sok Cheon Pak." OBM Integrative and Complementary Medicine 07, no. 03 (2022): 1–4. http://dx.doi.org/10.21926/obm.icm.2203043.
Pełny tekst źródłaMarquis, Yewande Alice. "From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts." Journal of Engineering Research and Reports 26, no. 5 (2024): 138–54. http://dx.doi.org/10.9734/jerr/2024/v26i51141.
Pełny tekst źródłaM Sahyudi and Erliyan Redy Susanto. "Analisis Implementasi Sistem Keamanan Basis Data Berbasis Role-Based Access Control (RBAC) pada Aplikasi Enterprise Resource Planning." SATESI: Jurnal Sains Teknologi dan Sistem Informasi 5, no. 1 (2025): 105–16. https://doi.org/10.54259/satesi.v5i1.3997.
Pełny tekst źródłaNyame, Gabriel, and Zhiguang Qin. "Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework." Information 11, no. 6 (2020): 334. http://dx.doi.org/10.3390/info11060334.
Pełny tekst źródłaOoi, Soo Liang, Peter S. Micalos, and Sok Cheon Pak. "Modified Rice Bran Arabinoxylan by Lentinus edodes Mycelial Enzyme as an Immunoceutical for Health and Aging—A Comprehensive Literature Review." Molecules 28, no. 17 (2023): 6313. http://dx.doi.org/10.3390/molecules28176313.
Pełny tekst źródłaOoi, Soo Liang, Sok Cheon Pak, Peter S. Micalos, et al. "The Health-Promoting Properties and Clinical Applications of Rice Bran Arabinoxylan Modified with Shiitake Mushroom Enzyme—A Narrative Review." Molecules 26, no. 9 (2021): 2539. http://dx.doi.org/10.3390/molecules26092539.
Pełny tekst źródłaLewis, John E., Steven E. Atlas, Oscar L. Higuera, et al. "The Effect of a Hydrolyzed Polysaccharide Dietary Supplement on Biomarkers in Adults with Nonalcoholic Fatty Liver Disease." Evidence-Based Complementary and Alternative Medicine 2018 (May 3, 2018): 1–10. http://dx.doi.org/10.1155/2018/1751583.
Pełny tekst źródłade Carvalho Junior, Marcelo Antonio, and Paulo Bandiera-Paiva. "Health Information System Role-Based Access Control Current Security Trends and Challenges." Journal of Healthcare Engineering 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/6510249.
Pełny tekst źródłaMitra, Barsha, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri. "Migrating from RBAC to temporal RBAC." IET Information Security 11, no. 5 (2017): 294–300. http://dx.doi.org/10.1049/iet-ifs.2016.0258.
Pełny tekst źródłaRozprawy doktorskie na temat "RBAC"
Guo, Yuxia. "User/group administration for RBAC." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0001/MQ42067.pdf.
Pełny tekst źródłaKhambhammettu, Hemanth. "Enforcing complex policies in RBAC." Thesis, Royal Holloway, University of London, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529765.
Pełny tekst źródłaBuccelli, Emanuele. "Ingegnerizzazione di RBAC-MAS in TuCSoN." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8462/.
Pełny tekst źródłaDarwish, Wesam M. "Analysis of ANSI RBAC support in commercial middleware." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/7147.
Pełny tekst źródłaMa, Mingchao. "Distributed RBAC for subscription-based remote network services." Thesis, University of Greenwich, 2007. http://gala.gre.ac.uk/6232/.
Pełny tekst źródłaRegateiro, Diogo José Domingues. "A secure, distributed and dynamic RBAC for relational applications." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14045.
Pełny tekst źródłaSquarcina, Marco <1984>. "Granalyze: towards the automatic verification of Grsecurity RBAC policies." Master's Degree Thesis, Università Ca' Foscari Venezia, 2014. http://hdl.handle.net/10579/4729.
Pełny tekst źródłaCosta, Vanderlei Ferreira da. "Autorização integrada entre portais e Globus baseada no modelo RBAC." Universidade Católica de Santos, 2008. http://biblioteca.unisantos.br:8181/handle/tede/603.
Pełny tekst źródłaDamasceno, Carlos Diego Nascimento. "Evaluating finite state machine based testing methods on RBAC systems." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-11112016-101158/.
Pełny tekst źródłaGoran, Sladić. "Model kontekstno zavisne kontrole pristupa u poslovnim sistemima." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2011. http://dx.doi.org/10.2298/NS2011SLADICGORAN.
Pełny tekst źródłaKsiążki na temat "RBAC"
Fischer-Hellmann, Klaus-Peter. Information Flow Based Security Control Beyond RBAC. Edited by Rainer Bischoff. Springer Fachmedien Wiesbaden, 2012. http://dx.doi.org/10.1007/978-3-8348-2618-3.
Pełny tekst źródłaFilho, Oscar Gomes. RBAC, Rio Branco Atlético Clube: História e conquistas, 1913-1987. [s.n.], 2002.
Znajdź pełny tekst źródłaassot͡siat͡sii͡a, Rossiĭskai͡a bibliotechnai͡a. RBA. Rossiĭskai͡a bibliotechnai͡a assot͡siat͡sii͡a, 2005.
Znajdź pełny tekst źródłaMeroni, Germana, ed. TRIM/RBCC Proteins. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5398-7.
Pełny tekst źródłaMeroni, Germana. TRIM/RBCC proteins. Springer Science+Business Media, 2012.
Znajdź pełny tekst źródłaSbrang char rtsom sgrig khang. Lang tshoʼi rbab chu. Mtsho-sngon Mi-rigs Dpe-skrun Khang, 2016.
Znajdź pełny tekst źródłaʼGyur-med. Ling tsho'i rbab chu. Mtsho-sngon mi rigs dpe skrun khang, 1994.
Znajdź pełny tekst źródłaCorp, INDUS, and United States. Environmental Protection Agency. Control Technology Center, eds. User's manual for the RBLC BBS. Control Technology Center, U.S. Environmental Protection Agency, 1997.
Znajdź pełny tekst źródłaKatcharian, Hope. Risk-Based Corrective Action (RBCA) at petroleum contaminated sites: The rationale for RBCA and natural attenuation. Available from National Technical Information Service, 1997.
Znajdź pełny tekst źródłaCorp, INDUS, Clean Air Technology Center (U.S.), and United States. Environmental Protection Agency. Office of Air Quality Planning and Standards. Information Transfer Group, eds. User's manual for the RBLC data base. Information Transfer Group, Office of Air Quality Planning and Standards, U.S. Environmental Protection Agency, 1998.
Znajdź pełny tekst źródłaCzęści książek na temat "RBAC"
Subramanian, Shiva. "Kubernetes RBAC." In Deploy Container Applications Using Kubernetes. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9277-8_11.
Pełny tekst źródłaWang, Lunwei, Lifeng Wei, Xiangke Liao, and Huaimin Wang. "AT-RBAC: An Authentication Trustworthiness-Based RBAC Model." In Grid and Cooperative Computing - GCC 2004 Workshops. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30207-0_43.
Pełny tekst źródłaMolesini, Ambra, Enrico Denti, and Andrea Omicini. "RBAC-MAS and SODA: Experimenting RBAC in AOSE." In Engineering Societies in the Agents World IX. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02562-4_4.
Pełny tekst źródłaOleshchuk, Vladimir. "Trust-Aware RBAC." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33704-8_9.
Pełny tekst źródłaZhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_1509-2.
Pełny tekst źródłaBarker, Steve, Paul Douglas, and Terry Fanning. "Implementing RBAC Policies." In Research Directions in Data and Applications Security. Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35697-6_3.
Pełny tekst źródłaZhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1509.
Pełny tekst źródłaZhang, Yue, and James B. D. Joshi. "GEO-RBAC Model." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1509.
Pełny tekst źródłaChandran, Suroop Mohan, and J. B. D. Joshi. "LoT-RBAC: A Location and Time-Based RBAC Model." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11581062_27.
Pełny tekst źródłaDing, Yi, Jun Jin, Jinglun Zhang, Zhongyi Wu, and Kai Hu. "SC-RBAC: A Smart Contract based RBAC Model for DApps." In Human Centered Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37429-7_8.
Pełny tekst źródłaStreszczenia konferencji na temat "RBAC"
Kirkpatrick, Michael S., Maria Luisa Damiani, and Elisa Bertino. "Prox-RBAC." In the 19th ACM SIGSPATIAL International Conference. ACM Press, 2011. http://dx.doi.org/10.1145/2093973.2094018.
Pełny tekst źródłaBertino, Elisa, Barbara Catania, Maria Luisa Damiani, and Paolo Perlasca. "GEO-RBAC." In the tenth ACM symposium. ACM Press, 2005. http://dx.doi.org/10.1145/1063979.1063985.
Pełny tekst źródłaYouman, Charles E. "RBAC transition." In the first ACM Workshop. ACM Press, 1996. http://dx.doi.org/10.1145/270152.270160.
Pełny tekst źródłaKiviharju, Mikko. "RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies." In International Conference on Security and Cryptography. SCITEPRESS - Science and and Technology Publications, 2014. http://dx.doi.org/10.5220/0005122105000509.
Pełny tekst źródłaFerrara, Anna Lisa, Georg Fuchsbauer, and Bogdan Warinschi. "Cryptographically Enforced RBAC." In 2013 IEEE 26th Computer Security Foundations Symposium (CSF). IEEE, 2013. http://dx.doi.org/10.1109/csf.2013.15.
Pełny tekst źródłaCoyne, Edward J. "Prioritizing RBAC features." In the first ACM Workshop. ACM Press, 1996. http://dx.doi.org/10.1145/270152.270156.
Pełny tekst źródłaSandhu, Ravi. "Issues in RBAC." In the first ACM Workshop. ACM Press, 1996. http://dx.doi.org/10.1145/270152.270162.
Pełny tekst źródłaOuyang, Kai, and James B. D. Joshi. "CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time." In 2007 IEEE International Performance, Computing, and Communications Conference. IEEE, 2007. http://dx.doi.org/10.1109/pccc.2007.358928.
Pełny tekst źródłaFerreira, Ana, David Chadwick, Pedro Farinha, et al. "How to Securely Break into RBAC: The BTG-RBAC Model." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.12.
Pełny tekst źródłaBouchahda, Ahlem, Nhan Le Thanh, Adel Bouhoula, and Faten Labbene. "RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases." In 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE). IEEE, 2010. http://dx.doi.org/10.1109/securware.2010.30.
Pełny tekst źródłaRaporty organizacyjne na temat "RBAC"
Hull, Julie, and Mark Markham. RBAC Driven Least Privilege Architecture For Control Systems. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1124080.
Pełny tekst źródłaKlasky, Hilda B., Sashi Tadinada, Paul T. Williams, and Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1093096.
Pełny tekst źródłaWinters, Paul, Benjamin Wakefield, Irene Toma, Anneke Schmider, Frini Chantzi, and Osman Dar. Facilitating progress towards SDG2: Zero Hunger. Royal Institute of International Affairs, 2022. http://dx.doi.org/10.55317/9781784135072.
Pełny tekst źródłaCelhay, Pablo, Sebastian Martinez, and Pedro Bernal. Is Results-Based Aid More Effective than Conventional Aid?: Evidence from the Health Sector in El Salvador. Inter-American Development Bank, 2018. http://dx.doi.org/10.18235/0011812.
Pełny tekst źródłaOu, Sivhuoch. A Rights-Based Approach to Development: A Cambodian Perspective. Cambodia Development Resource Institute, 2015. https://doi.org/10.64202/wp.101.201508.
Pełny tekst źródłaSamios N. P. RBRC Scientific Review Committee Meeting, Volume 101. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1093764.
Pełny tekst źródłaSamios, N. P. RBRC Scientific Review Committee Meeting, Volume 97. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/972031.
Pełny tekst źródłaORGANIZERS: OZAKI, S., and N. P. SAMIOS. PROCEEDINGS OF RIKEN BNL RESEARCH CENTER WORKSHOP: RBRC QCDOC COMPUTER DEDICATION AND SYMPOSIUM ON RBRC QCDOC (VOLUME 74). Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/15020005.
Pełny tekst źródłaEn'yo, Hideto, and Taku Izubuchi. RIKEN/RBRC Scientific Review Committee Meeting (Vol. 132). Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1524567.
Pełny tekst źródłaสุวัฑฒน, ดวงสมร, วีระพงศ์ โกยกุล та วิวัฒน์ ชวนะนิกุล. การศึกษาโครโมโซมในโคที่มีท่อปัสสาวะผิดปกติแต่กำเนิด. จุฬาลงกรณ์มหาวิทยาลัย, 2000. https://doi.org/10.58837/chula.res.2000.47.
Pełny tekst źródła