Gotowa bibliografia na temat „UCON MODEL”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „UCON MODEL”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "UCON MODEL"
Wu, Hai Ying. "Usage Control Model Based on Regular Grammar." Advanced Materials Research 433-440 (January 2012): 4590–96. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.4590.
Pełny tekst źródłaJiang, Ze Tao, and Jia Fei He. "Research on an UCON Extension Model Applicable to Industrial Control." Applied Mechanics and Materials 20-23 (January 2010): 470–76. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.470.
Pełny tekst źródłaGan, Sheng Ke, and Feng Bin Wang. "An Extended UCON Model Supporting Distributed Multidomain Applications." Advanced Materials Research 433-440 (January 2012): 5616–19. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.5616.
Pełny tekst źródłaPark, Jaehong, and Ravi Sandhu. "The UCON ABC usage control model." ACM Transactions on Information and System Security 7, no. 1 (2004): 128–74. http://dx.doi.org/10.1145/984334.984339.
Pełny tekst źródłaXu, Xiao Lin. "Research on Task-Based Usage Control Core Models in Workflow for Manufacturing Environment." Advanced Materials Research 886 (January 2014): 378–81. http://dx.doi.org/10.4028/www.scientific.net/amr.886.378.
Pełny tekst źródłaChang, He, Yang Lu, and Yantao Sun. "Simultaneous Prediction, Determination, and Extraction of Four Polycyclic Aromatic Hydrocarbons in the Environment Using a UCON–NaH2PO4 Aqueous Two-Phase Extraction System Combined with High-Performance Liquid Chromatography-Ultraviolet Detection." Molecules 27, no. 19 (2022): 6465. http://dx.doi.org/10.3390/molecules27196465.
Pełny tekst źródłaTang, Jia. "Research on Design of Network Platform Based on UCON Access Control Model." Applied Mechanics and Materials 543-547 (March 2014): 4589–92. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.4589.
Pełny tekst źródłaDai, Chang Ying, Wen Tao Gong, and Jing Liu. "Access Process of Data-Flow in Cross-Domain Usage Control Model Based on XACML." Advanced Materials Research 143-144 (October 2010): 1275–79. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1275.
Pełny tekst źródłaLiu, Jing, Rongchao Liu, and Yingxu Lai. "Risk-Based Dynamic Identity Authentication Method Based on the UCON Model." Security and Communication Networks 2022 (March 31, 2022): 1–13. http://dx.doi.org/10.1155/2022/2509267.
Pełny tekst źródłaJASIM AL-FARTTOOSI, DAWOOD SALMAN. "Formal model and Policy specification for software defined networks." Journal of Kufa for Mathematics and Computer 3, no. 2 (2016): 55–62. http://dx.doi.org/10.31642/jokmc/2018/030207.
Pełny tekst źródłaRozprawy doktorskie na temat "UCON MODEL"
Camy, Alexandre Rosa. "Aplicação do modelo UCON abc em sistemas de comércio eletrônico B2B." Florianópolis, SC, 2005. http://repositorio.ufsc.br/handle/123456789/102447.
Pełny tekst źródłaTeigão, Rafael Coninck. "Controle de uso de recursos em sistemas operacionais utilizando o modelo UCON ABC / Rafael Coninck Teigão ; orientador, Carlos Maziero." reponame:Biblioteca Digital de Teses e Dissertações da PUC_PR, 2007. http://www.biblioteca.pucpr.br/tede/tde_busca/arquivo.php?codArquivo=1417.
Pełny tekst źródłaAkram, Raja. "A user centric security model for tamper-resistant devices." Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/aca52f8c-6233-4f73-a9da-025d25ab1295/1/.
Pełny tekst źródłaJOSHI, NIDHI. "AUGMENTATION IN UCON MODEL." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15219.
Pełny tekst źródłaLu, Po-Hung, and 呂柏鋐. "The Business Model of UCOM IT Training Center." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/7wyktv.
Pełny tekst źródłaWANG, SHIH-YA, and 王詩亞. "A Study on Latent Growth Model of UCAN Common Competency Self-Evaluation─A Case of M University." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/3ktwdj.
Pełny tekst źródłaKsiążki na temat "UCON MODEL"
Díaz Bautista, Alejandro, and Mayrén Polanco Gaytán. Regional Economic Growth In Mexico: The 21st Century Economy. 2022nd ed. Universidad de Colima, 2022. http://dx.doi.org/10.53897/li.2022.0007.ucol.
Pełny tekst źródłaCzęści książek na temat "UCON MODEL"
Liu, Yanpei, Yuesheng Gu, and Junhui Fu. "A New UCON Model for Web Industrial Control." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-2169-2_140.
Pełny tekst źródłaLili, Xie, and Zhai Zhigang. "Formal Specification of Concurrent Enforcement UCON Model with CTL Logic." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24265-7_54.
Pełny tekst źródłaHariri, Ali, Amjad Ibrahim, Bithin Alangot, et al. "UCON+: Comprehensive Model, Architecture and Implementation for Usage Control and Continuous Authorization." In Collaborative Approaches for Cyber Security in Cyber-Physical Systems. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-16088-2_10.
Pełny tekst źródłaResatsch, Florian. "Designing an Ubiquitous Computing Application Development and Evaluation Process Model (UCAN)." In Ubiquitous Computing. Gabler, 2010. http://dx.doi.org/10.1007/978-3-8349-8683-2_4.
Pełny tekst źródłaSariyar, Murat, and Jürgen Holm. "Embedding Risk-Based Anonymization into Data Access Control for Providing Individual-Level Health Data in a Secure Way." In Studies in Health Technology and Informatics. IOS Press, 2022. http://dx.doi.org/10.3233/shti210953.
Pełny tekst źródłaBerisha-Muharremi, Venera. "Perspective Chapter: Crosstalk between Bone Metabolism and Insulin Resistance." In Hypoglycemia - New Insights [Working Title]. IntechOpen, 2024. http://dx.doi.org/10.5772/intechopen.1005653.
Pełny tekst źródłaLi Ming, Xu Gangyan, Shao Saijun, Lin Peng, and Huang G.Q. "Ubiquitous Cloud Object for Fine-Grained Resource Management in E-Commerce Logistics." In Advances in Transdisciplinary Engineering. IOS Press, 2017. https://doi.org/10.3233/978-1-61499-779-5-1049.
Pełny tekst źródła"It’s Not about You: The UConn Social Entrepreneur Corps Global Commonwealth Study Abroad Model." In The Handbook of Practice and Research in Study Abroad. Routledge, 2010. http://dx.doi.org/10.4324/9780203876640-40.
Pełny tekst źródłaAkram Raja Naeem, Markantonakis Konstantinos, and Mayes Keith. "Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions." In Cryptology and Information Security Series. IOS Press, 2013. https://doi.org/10.3233/978-1-61499-328-5-107.
Pełny tekst źródłaAbdrabo, Amal Adel. "Third-Spaces and the Creation of Socio-Spatial Identity." In Advances in Electronic Government, Digital Divide, and Regional Development. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4948-3.ch008.
Pełny tekst źródłaStreszczenia konferencji na temat "UCON MODEL"
Rojas, Sergio A., �lvaro Orjuela, and Paulo C. Narv�ez. "Deacidification of Used Cooking Oil: Modeling and Validation of Ethanolic Extraction in a Liquid-Liquid Film Contactor." In The 35th European Symposium on Computer Aided Process Engineering. PSE Press, 2025. https://doi.org/10.69997/sct.199202.
Pełny tekst źródłaLi, Xiangyu, and Bodong Shang. "An Analytical Model for Coordinated Multi-Satellite Joint Transmission System." In 2024 International Conference on Ubiquitous Communication (Ucom). IEEE, 2024. http://dx.doi.org/10.1109/ucom62433.2024.10695881.
Pełny tekst źródłaZhang, Zhicheng, Tianyu Zhang, and Jiarun Song. "Assessing Wireless Screen-Casting Services: A Comprehensive Quality of Experience Model." In 2024 International Conference on Ubiquitous Communication (Ucom). IEEE, 2024. http://dx.doi.org/10.1109/ucom62433.2024.10695843.
Pełny tekst źródłaZhao, Kai, Zhaohui Yang, Chongwen Huang, Xiaoming Chen, and Zhaoyang Zhang. "FedsLLM: Federated Split Learning for Large Language Models Over Communication Networks." In 2024 International Conference on Ubiquitous Communication (Ucom). IEEE, 2024. http://dx.doi.org/10.1109/ucom62433.2024.10695888.
Pełny tekst źródła"Enforcement of CA-UCON Model." In International Academy of Engineers. International Academy of Engineers, 2015. http://dx.doi.org/10.15242/iae.iae0615001.
Pełny tekst źródłaZetao Jiang, Shuo Hu, Shengke Gan, and Yuanzhong Shu. "Research on an UCON model supporting distributed management." In 2008 International Conference on Information and Automation (ICIA). IEEE, 2008. http://dx.doi.org/10.1109/icinfa.2008.4608244.
Pełny tekst źródłaJiao, Dongliang, Liu Lianzhong, Li Ting, and Ma Shilong. "Realization of UCON Model Based on Extended-XACML." In 2011 International Conference on Future Computer Sciences and Application (ICFCSA). IEEE, 2011. http://dx.doi.org/10.1109/icfcsa.2011.27.
Pełny tekst źródłaJiang, Zetao, Jiafei He, Shuo Hu, and Bina Zheng. "Research on an UCON Model Supporting Distributed Workflow." In 2009 3rd International Conference on Genetic and Evolutionary Computing (WGEC). IEEE, 2009. http://dx.doi.org/10.1109/wgec.2009.107.
Pełny tekst źródłaLong, Dan, Juan Wang, Bin Han, Ding Chen, and Lei Shi. "MS-UCON: A Usage Control Model for Meteorological Operational Systems." In 2023 19th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). IEEE, 2023. http://dx.doi.org/10.1109/icnc-fskd59587.2023.10281006.
Pełny tekst źródłaKumar, Manoj, Nidhi Joshi, and Deepak Kumar. "Augmentation in UCON Access Control Model for E-Healthcare Domain." In 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2018. http://dx.doi.org/10.1109/iccons.2018.8663205.
Pełny tekst źródła