ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Access Control Systems & Methodology
(ISC)2 Press - Official (ISC)2® Guide to the ISSAP® CBK, Second Edition
◽
10.1201/b15693-2
◽
2013
◽
pp. 1-129
Keyword(s):
Access Control
◽
Control Systems
◽
Systems Methodology
Download Full-text
Related Documents
Cited By
References
Domain 1 - Access Control Systems & Methodology
Official (ISC)2® Guide to the ISSAP® CBK
◽
10.1201/9781315373300-5
◽
2017
◽
pp. 27-156
Keyword(s):
Access Control
◽
Control Systems
◽
Systems Methodology
Download Full-text
Directions of Access Control Systems Improving for Radiation Hazardous Facilities
Global Nuclear Safety
◽
10.26583/gns-2018-03-03
◽
2018
◽
Vol 12
(3)
◽
pp. 23-29
Author(s):
K.G. Terehov
Keyword(s):
Access Control
◽
Control Systems
Download Full-text
Alarm systems. Access control systems for use in security applications
10.3403/01574713u
◽
2015
◽
Keyword(s):
Access Control
◽
Control Systems
◽
Security Applications
◽
Alarm Systems
Download Full-text
Alarm systems. Access control systems for use in security applications
10.3403/01574713
◽
1997
◽
Keyword(s):
Access Control
◽
Control Systems
◽
Security Applications
◽
Alarm Systems
Download Full-text
Alarm systems. Access control systems for use in security applications.
10.3403/02160371
◽
2000
◽
Keyword(s):
Access Control
◽
Control Systems
◽
Security Applications
◽
Alarm Systems
Download Full-text
Alarm systems. Access control systems for use in security applications
10.3403/bsen50133
◽
2015
◽
Keyword(s):
Access Control
◽
Control Systems
◽
Security Applications
◽
Alarm Systems
Download Full-text
Ontology driven AI and Access Control Systems for Smart Fisheries
Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
◽
10.1145/3445969.3450429
◽
2021
◽
Author(s):
Sai Sree Laya Chukkapalli
◽
Shaik Barakhat Aziz
◽
Nouran Alotaibi
◽
Sudip Mittal
◽
Maanak Gupta
◽
...
Keyword(s):
Access Control
◽
Control Systems
Download Full-text
On Optimal Employee Assignment in Constrained Role-Based Access Control Systems
ACM Transactions on Management Information Systems
◽
10.1145/2996470
◽
2017
◽
Vol 7
(4)
◽
pp. 1-24
◽
Cited By ~ 4
Author(s):
Arindam Roy
◽
Shamik Sural
◽
Arun Kumar Majumdar
◽
Jaideep Vaidya
◽
Vijayalakshmi Atluri
Keyword(s):
Access Control
◽
Control Systems
◽
Role Based Access Control
◽
Role Based
Download Full-text
Multimedia sensor fusion for retrieving identity in biometric access control systems
ACM Transactions on Multimedia Computing Communications and Applications
◽
10.1145/1865106.1865110
◽
2010
◽
Vol 6
(4)
◽
pp. 1-21
◽
Cited By ~ 5
Author(s):
Girija Chetty
◽
Matthew White
Keyword(s):
Access Control
◽
Control Systems
◽
Sensor Fusion
Download Full-text
Deconflicting Policies in Attribute-Based Access Control Systems
2018 IEEE 5th International Congress on Information Science and Technology (CiSt)
◽
10.1109/cist.2018.8596576
◽
2018
◽
Cited By ~ 1
Author(s):
Mohamed Yahiaoui
◽
Ahmed Zinedine
◽
Mostafa Harti
Keyword(s):
Access Control
◽
Control Systems
◽
Attribute Based Access Control
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close