Výsledky vyhledávání - "Distributed Usage Control"
-
1
Autoři: Wagner, Paul Georg
Zdroj: trustworthy-distributed-usage-control-enforcement-in-heterogeneous-trusted-computing-environments.pdf
Témata: thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation::UYAM Maths for computer scientists, Trustworthy Data Spaces, Remote Attestation, Distributed Usage Control, Vertrauenswürdige Datenräume, Attestierungsprotokolle, Trusted Computing, Verteilte Nutzungskontrolle
Popis souboru: image/jpeg; application/pdf
Přístupová URL adresa: https://library.oapen.org/bitstream/20.500.12657/98205/1/trustworthy-
distributed -usage -control -enforcement-in-heterogeneous-trusted-computing-environments.pdf
https://directory.doabooks.org/handle/20.500.12854/152085
https://library.oapen.org/handle/20.500.12657/98205 -
2
Autoři:
Přispěvatelé:
Témata: Distributed Usage Control, Trusted Computing, Provenance Tracking, Trusted Platform Modules, Software Guard Extensions, ARM TrustZone
Popis souboru: application/pdf
Relation: Karlsruher Schriften zur Anthropomatik; 68; https://doi.org/10.5445/KSP/1000175307; https://publica.fraunhofer.de/handle/publica/473941
-
3
Autoři: a další
Popis souboru: application/pdf
Relation: https://www.mdpi.com/1996-1073/15/19/7113; Energies 15(19) : (2022) // Article ID 7113; https://hdl.handle.net/10810/58113
-
4
-
5
Autoři: a další
Přispěvatelé: a další
Témata: Categories and Subject Descriptors D.4.6 [Security and Protection, Information flow con- trols, D.4.6 [Security and Protection, Access controls General Terms Security Keywords Distributed Usage Control, Policy Enforcement, Security and Privacy, Sticky Policies, Data Flow Tracking
Popis souboru: application/pdf
-
6
Autoři:
Přispěvatelé:
Témata: trols, D.4.6 [Security and Protection, Access controls General Terms Security Keywords Distributed Usage Control, Policy Enforcement, Security and Privacy, Sticky Policies
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.687.4950; http://www4.in.tum.de/%7Ekelbert/papers/sacmat12.pdf
-
7
Autoři:
Témata: interactive environment, smart assistance system, identity management, distributed usage control, trusted reference monitor, trusted platform module, remote attestation
Time: 004, 670
Popis souboru: application/pdf
Relation: PErvasive Technologies Related to Assistive Environments Conference (PETRA) 2018; PETRA 2018, 11th PErvasive Technologies Related to Assistive Environments Conference. Proceedings; https://publica.fraunhofer.de/handle/publica/401144
-
8
Autoři: a další
Témata: information flow tracking, explicit flows, information flow semantics specification, distributed usage control, policy enforcement
Time: 004, 670
Relation: International Conference on Security and Management (SAM) 2016; World Congress in Computer Science, Computer Engineering, and Applied Computing (WorldComp) 2016; International Conference on Security and Management, SAM 2016; https://publica.fraunhofer.de/handle/publica/393738
-
9
Autoři: a další
Přispěvatelé: a další
Témata: Categories and Subject Descriptors D.4.6 [Security and Protection, Information flow con- trols, D.4.6 [Security and Protection, Access controls General Terms Security Keywords Distributed Usage Control, Policy Enforcement, Security and Privacy, Sticky Policies, Data Flow Tracking
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.686.5561; http://www4.in.tum.de/%7Ekelbert/papers/codaspy13.pdf
-
10
Autoři:
Přispěvatelé:
Témata: trols, D.4.6 [Security and Protection, Access controls General Terms Security Keywords Distributed Usage Control, Policy Enforcement, Security and Privacy, Sticky Policies
Popis souboru: application/pdf
-
11
Nájsť tento článok vo Web of Science