Results 281 to 290 of about 1,009,466 (301)
Some of the next articles are maybe not open access.
An architecture for enforcing end-to-end access control over web applications
ACM Symposium on Access Control Models and Technologies, 2010Boniface Hicks +7 more
semanticscholar +1 more source
Decision aids for localized prostate cancer treatment choice: Systematic review and meta‐analysis
Ca-A Cancer Journal for Clinicians, 2015Philippe D Violette +2 more
exaly
Digital forensic readiness in a cloud environment
IEEE Region 8 Conference AFRICON, 2013George Sibiya +3 more
semanticscholar +1 more source
CHARM: A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability
IEEE Transactions on Cloud Computing, 2015Zhenhua Li, Yafei Dai
exaly
Detection of mobile applications leaking sensitive data
International Symposium on Digital Forensics and Security, 2017Yavuz Canbay +2 more
semanticscholar +1 more source
A Sensory-Data-Hosting Oriented Scheduling Strategy on Virtual Machine
2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, 2013Xiang Li, Yong Jiang
semanticscholar +1 more source
Optimization-based distribution grid hosting capacity calculations
Applied Energy, 2018Mansoor Alturki +2 more
exaly

