Книги з теми "Time based access control"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 книг для дослідження на тему "Time based access control".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте книги для різних дисциплін та оформлюйте правильно вашу бібліографію.
Zhang, Rui. Relation based access control. Heidelberg: AKA, 2010.
Ferraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.
Ferraiolo, David. Role-based access controls. Boston: Artech House, 2003.
Yuen, Clement. Rate control with pricing in contention-based access networks. Ottawa: National Library of Canada, 2002.
Kogan, Konstantin, and Eugene Khmelnitsky. Scheduling: Control-Based Theory and Polynomial-Time Algorithms. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4675-7.
Kogan, Konstantin. Scheduling: Control-based theory and polynomial-time algorithms. Dordrecht: Kluwer Academic Publishers, 2000.
Hendrick, Thomas E. Purchasing's contributions to time-based strategies. Tempe, Ariz: Center for Advanced Purchasing Studies, 1994.
Larson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Larson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Larson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Mehta, Axaykumar, and Bijnan Bandyopadhyay. Frequency-Shaped and Observer-Based Discrete-time Sliding Mode Control. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2238-5.
L, Wilson C. Simple test procedure for image-based biometric verification systems. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Ichikawa, Kunihiko. Control system design based on exact model matching techniques. Berlin: Springer-Verlag, 1985.
Credeur, Leonard. Simulation evaluation of TIMER, a time-based terminal air traffic, flow-management concept. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Division, 1989.
Brown, Edwin Lyle. 802.1X port-based authentication. Boca Raton: Auerbach, 2007.
Brown, Edwin Lyle. 802.1X Port-Based Authentication. London: Taylor and Francis, 2006.
Sun, Qi-zhi. Knowledge-based interactive real-time control system in product-focused manufacturing environment. Portsmouth: Portsmouth Polytechnic, Business School, 1991.
Kang, Shu Gang, and Shiu Hong Choi. Multi-Agent Based Beam Search for Real-Time Production Scheduling and Control. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4576-9.
Knox, Charles E. Ground-based time-guidance algorithm for control of airplanes in a time-metered air traffic control environment: A piloted simulation study. Hampton, Va: Langley Research Center, 1986.
Michiels, W. Stability and stabilization of time-delay systems: An Eigenvalue-based approach. Philadelphia: Society for Industrial and Applied Mathematics, 2007.
ACM, Workshop on Role-Based Access Control (5th 2000 Berlin Germany). Proceedings, Fifth ACM Workshop on Role-Based Access Control: Berlin, Germany, July 26-27, 2000. New York, N.Y: ACM, 2000.
Williams, David H. Airborne four-dimensional flight management in a time-based air traffic control environment. Hampton, Va: Langley Research Center, 1991.
Ho, Tan-Jan. The control of real-time discrete-event systems subject to predicate-based constraints. Ottawa: National Library of Canada = Bibliothèque nationale du Canada, 1997.
Williams, David H. Airborne four-dimensional flight management in a time-based air traffic control environment. [Washington, D.C.]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Division, 1991.
Credeur, Leonard. Final-approach spacing aids (FASA) evaluation for terminal-area, time-based air traffic control. Hampton, Va: Langley Research Center, 1993.
ACM, Workshop on Role-Based Access Control (3rd 1998 Fairfax Va ). Proceedings: Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 22-23, 1998. New York, N.Y: ACM, 1998.
ACM Workshop on Role-Based Access Control (4th 1999 Fairfax, Va.). Proceedings, Fourth ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, October 28-29, 1999. New York, N.Y: ACM, 1999.
ACM Workshop on Role-Based Access Control (4th 1999 Fairfax, Virginia, USA). Proceedings: Fourth ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 28-29, 1999. New York: Association for Computing Machinery, 1999.
ACM, Workshop on Role-Based Access Control (2nd 1997 Fairfax Virginia). Proceedings Second ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, November 6-7, 1997. New York: ACM, 1997.
Baier, Dominick. Guide to claims-based identity and access control: Authentication and authorization for services and the web. [Redmond, Wash.]: Microsoft Press, 2010.
ACM Workshop on Role-Based Access Control (2nd 1997 Fairfax, Va.). Proceedings: Second ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, November 6-7, 1997. New York: Association for Computing Machinery, 1997.
Das, Swagata, Devashree Tripathy, and Jagdish Lal Raheja. Real-Time BCI System Design to Control Arduino Based Speed Controllable Robot Using EEG. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-3098-8.
ACM Workshop on Role-Based Access Control (1st 1995 Gaithersburg, Md.). Proceedings--First ACM Workshop on Role-Based Access Control: Gaithersburg, Maryland, USA, 30 November - 1 December 1995. New York, N.Y: Association for Computing Machinery, 1995.
Branscomb, Anne W. Rogue computer program-- viruses, worms, Trojan horses, and time bombs: Prank, prowess, protection or prosecution? Cambridge, Mass: Program on Information Resources Policy, Harvard University, Center for Information Policy Research, 1989.
Hippe, P. Design of observer-based compensators: From the time to the frequency domain. Dordrecht: Springer, 2009.
Attribute-Based Access Control. Artech House, 2017.
Ferraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control. Artech House Publishers, 2003.
Ferraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control, Second Edition. 2nd ed. Artech House Publishers, 2007.
Yan, Zhu, Dijiang Huang, and Qiuxiang Dong. Attribute-Based Encryption and Access Control. Taylor & Francis Group, 2020.
Yan, Zhu, Dijiang Huang, and Qiuxiang Dong. Attribute-Based Encryption and Access Control. Taylor & Francis Group, 2020.
Yan, Zhu, Dijiang Huang, and Qiuxiang Dong. Attribute-Based Encryption and Access Control. Taylor & Francis Group, 2020.
Zhu, Yan, Dijiang Huang, and Qiuxiang Dong. Attribute-Based Encryption and Access Control. Taylor & Francis Group, 2020.
Elli, Kartsakli, ed. Contention-based collision-resolution medium access control algorithms. New York: Nova Science Publishers, 2009.
A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Elli, Kartsakli, ed. Contention-based collision-resolution medium access control algorithms. New York: Nova Science Publishers, 2009.
National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.