-
1
-
-
35248831886
-
Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise
-
T.-Y. Chen et al., "Development of an access control model, system architecture and approaches for resource sharing in virtual enterprise," Computers in Industry, 2006
-
(2006)
Computers in Industry
-
-
Chen, T.-Y.1
-
2
-
-
35248859968
-
-
World Health Organization
-
World Health Organization, "Fact sheet No. 275," 2006; http://www.who.int/mediacentre/factsheets/fs275/en/index.html
-
(2006)
Fact sheet
, Issue.275
-
-
-
4
-
-
34548180384
-
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
-
D, Molnar, A, Soppera, and W. D., "A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags," Workshop in Selected Areas in Cryptography, 2005
-
(2005)
Workshop in Selected Areas in Cryptography
-
-
Molnar, D.1
Soppera, A.2
D., W.3
-
5
-
-
79955130588
-
-
H, Afsarmanesh, C, Garita, and H. L.O., Virtual Enterprises and Federated Information Sharing, Proc. of the 9th Int. Conf. Database and Expert Systems Applications (DEXA 1998), 1998, Springer, pp. 374-383.
-
H, Afsarmanesh, C, Garita, and H. L.O., "Virtual Enterprises and Federated Information Sharing," Proc. of the 9th Int. Conf. Database and Expert Systems Applications (DEXA 1998), 1998, Springer, pp. 374-383.
-
-
-
-
6
-
-
0033677904
-
Information sharing in a supply chain
-
Inderscience, pp
-
H.L, Lee, and W. S., "Information sharing in a supply chain," International Journal of Technology Management, 20(3), 2000, Inderscience, pp. 373-387.
-
(2000)
International Journal of Technology Management
, vol.20
, Issue.3
, pp. 373-387
-
-
Lee, H.L.1
S., W.2
-
8
-
-
33746560721
-
Exploiting information relationships for access control in pervasive computing, Pervasive and Mobile
-
U. Hengartner, and P. Steenkiste, "Exploiting information relationships for access control in pervasive computing," Pervasive and Mobile Computing, 2(3), 2006, pp. 344-367.
-
(2006)
Computing
, vol.2
, Issue.3
, pp. 344-367
-
-
Hengartner, U.1
Steenkiste, P.2
-
9
-
-
0035455653
-
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
-
I, Foster, C, Kesselman, and T. S., "The Anatomy of the Grid: Enabling Scalable Virtual Organizations," International Journal of High Performance Computing Applications, 15(3), 2001, pp. 200-222.
-
(2001)
International Journal of High Performance Computing Applications
, vol.15
, Issue.3
, pp. 200-222
-
-
Foster, I.1
Kesselman, C.2
S., T.3
-
10
-
-
33144457479
-
RFID security and privacy: A research survey
-
A. Juels, "RFID security and privacy: a research survey," IEEE Journal on Selected Areas in Communications, 24(2), 2006, pp. 381-394.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
11
-
-
35248871333
-
-
K, Traub, G, Allgair, and B. H, The EPCglobal Architecture Framework, EPCglobal Final Version, 2005,
-
K, Traub, G, Allgair, and B. H, "The EPCglobal Architecture Framework," EPCglobal Final Version, 2005,
-
-
-
-
12
-
-
84957707751
-
Token-Based Access to Digital Information
-
Springer, pp
-
L.E, Holmquist, J, Redstroem, and L. P., "Token-Based Access to Digital Information," Proceedings of First International Symposium on Handheld and Ubiquitous Computing (HUC'99), 1999, Springer, pp. 234-245.
-
(1999)
Proceedings of First International Symposium on Handheld and Ubiquitous Computing (HUC'99)
, pp. 234-245
-
-
Holmquist, L.E.1
Redstroem, J.2
P., L.3
-
13
-
-
0037661197
-
An approach to secure information flow on Object Oriented Role-based Access Control model
-
ACM Press, pp
-
C. Yang, and C. N. Zhang, "An approach to secure information flow on Object Oriented Role-based Access Control model," SAC '03: Proceedings of the 2003 ACM symposium on Applied computing, 2003, ACM Press, pp. 302-306.
-
(2003)
SAC '03: Proceedings of the 2003 ACM symposium on Applied computing
, pp. 302-306
-
-
Yang, C.1
Zhang, C.N.2
|