Results 271 to 280 of about 3,133,021 (299)
Some of the next articles are maybe not open access.
Permission based Android security: Issues and countermeasures
Computers and Security, 2014Zheran Fang
exaly
Permission from an Input/Output Perspective
Journal of Philosophical Logic, 2003Leendert van der Torre
exaly
Web-based permission marketing: Segmentation for the lodging industry
Tourism Management, 2007Dae-Young Kim, Alastair M Morrison
exaly
Blockchain based permission delegation and access control in Internet of Things (BACI)
Computers and Security, 2019Naveed Ahmad, Yue Cao
exaly
Passive versus Active Parental Permission in School-Based Survey Research
Evaluation Review, 2004Nancy D Brener
exaly
Supporting user authorization queries in RBAC systems by role–permission reassignment
Future Generation Computer Systems, 2018Jianfeng Lu, Zhao Zhang, Hao Peng
exaly
Symmetry of simple games and permission of voters
Applied Mathematics and Computation, 2000Akira Yamazaki, Takehiro Inohara
exaly
Automation of Building Permission by Integration of BIM and Geospatial Data
ISPRS International Journal of Geo-Information, 2018Lars Harrie
exaly

