• Aucun résultat trouvé

[PDF] Top 20 Database access control within a Java application

Has 10000 "Database access control within a Java application" found on our website. Below are the top 20 most common "Database access control within a Java application".

Database access control within a Java application

Database access control within a Java application

... the database schema into relational constructs then in E/R constructs is another possible ...(formerly a third-party product, purchased by Oracle in 2002 and now released Oracle9iAS ...is a ... Voir le document complet

8

Towards a Pervasive Access Control within Video Surveillance Systems

Towards a Pervasive Access Control within Video Surveillance Systems

... providing a variety of adaptive solutions in correspondence with the situation’s sensitivity ...the access control challenge or would assist the user in adapting and reformulating his query by ... Voir le document complet

16

Verifying Resource Access Control on Mobile Interactive Devices

Verifying Resource Access Control on Mobile Interactive Devices

... an access control model for programs which dynamically acquire permis- sions to access ...current access control model of the Java MIDP profile for mobile telephones by ... Voir le document complet

26

Steps towards adaptive situation and context-aware access: a contribution to the extension of access control mechanisms within pervasive information systems

Steps towards adaptive situation and context-aware access: a contribution to the extension of access control mechanisms within pervasive information systems

... In a short‐term perspective, we aim to focus on improving the implemented system and the process of finding alternative ...the application areas that we have treated for the validation of our ...predefined ... Voir le document complet

181

A virtual curtain for the detection of humans and access control

A virtual curtain for the detection of humans and access control

... with a support vector machine classifier [18]. An SVM is a binary classifier that maps its input features into a high-dimensional non-linear subspace where a linear decision surface is ...with ... Voir le document complet

12

[PDF] Cours complet pour apprendre a programmer en Java | Cours java

[PDF] Cours complet pour apprendre a programmer en Java | Cours java

... programmes Java avec le Bloc-notes de Windows ? Tout à ...programme Java dans votre IDE préféré et que vous l'exécuterez, celui-ci va pré-compiler votre code Java en byte code pour qu'ensuite votre ... Voir le document complet

772

Blockchain and access control : towards a more secure Internet of Things

Blockchain and access control : towards a more secure Internet of Things

... is a problem that is similar to double spending (see Section 2.14 . In a similar fashion, both transactions cannot ...such a use case, this delay is not an ...For a double sale for instance, ... Voir le document complet

246

JACPoL: A Simple but Expressive JSON-based Access Control Policy Language

JACPoL: A Simple but Expressive JSON-based Access Control Policy Language

... in a flexible expression ...under a large-scale network environment; second, its concise semantics and lightweight data representation make it easily replicable and transferable for distributed sys- ...the ... Voir le document complet

17

A model to reduce complexity and maintain coherence between Access Control and Transmission Control policies

A model to reduce complexity and maintain coherence between Access Control and Transmission Control policies

... A model to reduce complexity and maintain coherence between Access Control and Transmission Control policies Résumé : Afin de protéger les fuites de données et les accès non-autorisés, les ... Voir le document complet

43

Formal Analyze of a Private Access Control Protocol to a Cloud Storage

Formal Analyze of a Private Access Control Protocol to a Cloud Storage

... is a user who stores data on the ...of a writer is not satisfied against an attack in which the adversary delays the messages of some ...propose a fix, which prevents this ... Voir le document complet

9

[PDF] Cours Java : apprendre la recursivite pas a pas | Cours java

[PDF] Cours Java : apprendre la recursivite pas a pas | Cours java

... Conclusion : si on recherche l’efficacit´e (une ex´ecution rapide) et le programme peut ˆetre ´ecrit sans trop de difficult´es en style it´eratif, on pr´ef´erera l’it´eration. 13.4.2 Utilisation de la r´ecursivit´e ... Voir le document complet

11

Formal analysis of a private access control protocol to a cloud storage

Formal analysis of a private access control protocol to a cloud storage

... can access them from any location via the ...using a cloud storage. However, sharing sensitive data on a third party through a public network brings some security ...have a right of ... Voir le document complet

17

[PDF] Cours J2EE : apprendre a creez une application web avec Java EE | Cours j2ee

[PDF] Cours J2EE : apprendre a creez une application web avec Java EE | Cours j2ee

... describes a state change in a source. It can be generated as a consequence of a person interacting with the elements in a graphical user ...pressing a button, entering a ... Voir le document complet

73

On the isofunctionality of network access control lists

On the isofunctionality of network access control lists

... propose a configuration analysis tool that allows users to check policies against security ...propose a tool (Atomic Predicate Verifier) to verify network properties using a set of atomic predicates ... Voir le document complet

7

XPACML eXtensible Privacy Access Control Markup Language

XPACML eXtensible Privacy Access Control Markup Language

... in a hierarchy of policy sets, policies, and ...providing a mechanism that offers an advanced high-level Access ...in a finer granular access control than simply denying or ... Voir le document complet

6

Access control in IoT environments: Feasible scenarios

Access control in IoT environments: Feasible scenarios

... devices. A brief description of each el i rovided in 12 ...architecture A test bed was implemented to demonstrate the feasibility of the ...with a 64 KiB of instruction RAM, 96 KiB of data ...in ... Voir le document complet

7

Model-Based Tests for Access Control Policies

Model-Based Tests for Access Control Policies

... as a surprise and requires further ...for access control policies is a promising avenue of future ...is a manual process ...accessing a resource) should be run in many different ... Voir le document complet

11

Access control in full-duplex wireless networks.

Access control in full-duplex wireless networks.

... over a channel is extremely difficult and a cumbersome task and that it can not be done in a modeling ...follow a deterministic pattern, SUs can exactly determine the presence/absence time of ... Voir le document complet

105

Lightweight verification of control flow policies on Java bytecode

Lightweight verification of control flow policies on Java bytecode

... traditional Java environments, they are added to the class file in the form of class file at- ...tributes. Java Card platforms ...is a specific class files ... Voir le document complet

26

Evaluation of Control Structures for Dynamic Dispatch in Java

Evaluation of Control Structures for Dynamic Dispatch in Java

... Unité de recherche INRIA Lorraine LORIA, Technopôle de Nancy-Brabois - Campus scientifique 615, rue du Jardin Botanique - BP 101 - 54602 Villers-lès-Nancy Cedex France Unité de recherche[r] ... Voir le document complet

63

Show all 10000 documents...