Computers -- Access control -- Congresses
Resource Information
The concept Computers -- Access control -- Congresses represents the subject, aboutness, idea or notion of resources found in Boston University Libraries.
The Resource
Computers -- Access control -- Congresses
Resource Information
The concept Computers -- Access control -- Congresses represents the subject, aboutness, idea or notion of resources found in Boston University Libraries.
- Label
- Computers -- Access control -- Congresses
- Authority link
- (uri) http://id.loc.gov/authorities/subjects/sh2007008440
118 Items that share the Concept Computers -- Access control -- Congresses
Context
Context of Computers -- Access control -- CongressesSubject of
No resources found
No enriched resources found
- ... Annual International Conference on Privacy, Security and Trust.
- 1980 IEEE Symposium on Security and Privacy : 14-16 April 1980
- 1981 IEEE Symposium on Security and Privacy : 27-29 April 1981
- 1982 IEEE Symposium on Security and Privacy : 26-28 April 1982
- 1983 IEEE Symposium on Security and Privacy : 25-27 April 1983
- 1984 IEEE Symposium on Security and Privacy : April 29, 1984-May 2, 1984
- 1985 IEEE Symposium on Security and Privacy : 22-24 April 1985
- 1986 IEEE Symposium on Security and Privacy : 7-9 April 1986
- 1987 IEEE Symposium on Security and Privacy : 27-29 April 1987
- 2003 Symposium on Security and Privacy : proceedings : 11-14 May, 2003, Berkeley, California
- 2005 the IEE seminar on quantum cryptography : secure communications for business (Ref. No. 2005/11310) : 7 December 2005
- 2006 IEEE Symposium on Security and Privacy : (S & P 2006) : proceedings : 21-24 May, 2006, Berkeley/Oakland, California
- 2008 Sixth Annual Conference on Privacy, Security and Trust : 1-3 October 2008
- 2018 IEEE 31st Computer Security Foundations Symposium : 9-12 July 2018, Oxford, UK
- Advances in cryptology : proceedings of CRYPTO .
- Advances in cryptology : proceedings of EUROCRYPT ... a workshop on the theory and application of cryptographic techniques
- Advances in information and computer security : Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007 : proceedings
- Advances in information and computer security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008, proceedings
- COMPASS '91 : proceedings of the Sixth Annual Conference on Computer Assurance : systems integrity, software safety, and process security : June 24-June 27, 1991, National Institute of Standards and Technology, Gaithersburg, Maryland
- Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papers
- Computer security -- ESORICS 2009 : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009 : proceedings
- Computer security--ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings
- Computer security--ESORICS 2007 : 12th European Symposium on Research in Computer Security, Dresden, Germany, September 24-26, 2007 : proceedings
- Computer security--ESORICS 2010 : 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010 : proceedings
- Critical information infrastructures security : first international workshop, CRITIS 2006, Samos, Greece, August 31-September 1, 2006 ; revised papers
- Critical information infrastructures security : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers
- Critical information infrastructures security : third international workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 : revised papers
- Cryptology and computational number theory
- Detection of intrusions and malware & vulnerability assessment : third international conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006 : proceedings
- Detection of intrusions and malware, and vulnerability assessment : 4th international conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 : proceedings
- Detection of intrusions and malware, and vulnerability assessment : 6th international conference, DIMVA 2009, Como, Italy, July 9-10, 2009 : proceedings
- Detection of intrusions and malware, and vulnerability assessment : second international conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005 : proceedings
- Fast software encryption : 13th international workshop, FSE 2006, Graz, Austria, March 15-17, 2006 : revised selected papers
- Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 : revised selected papers
- Fast software encryption : 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008 : revised selected papers
- Formal to practical security : papers issued from the 2005-2008 French-Japanese collaboration
- Hardware and Architectural Support for Security and Privacy (HASP) 2015 : Portland, Oregon, USA, June 14, 2015
- Human interactive proofs : second international workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005 : proceedings
- Information security : 10th international conference, ISC 2007, ValparaÃso, Chile, October 9-12, 2007 : proceedings
- Information security : 11th international conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008 : proceedings
- Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings
- Information security : 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001 : proceedings
- Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings
- Information security : 6th international conference, ISC 2003, Bristol, UK, October 1-3, 2003 : proceedings
- Information security : 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004 : proceedings
- Information security : 8th international conference, ISC 2005, Singapore, September 20-23, 2005 : proceedings
- Information security : 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings
- Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings
- Information security : first international workshop, ISW '97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997 : proceedings
- Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings
- Information security and privacy : 10th Australasian conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings
- Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings
- Information systems security : 4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008 : proceedings
- Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings
- Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 ; proceedings
- Information systems security : third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings
- Joint OECD-Private Sector Workshop on Electronic Authentication : Stanford and Menlo Park, California 2-4 June 1999
- MIST '15 : proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats : October 12, 2015, Denver, Colorado, USA
- MIST '17 : proceedings of the 2017 International Workshop on Managing Insider Security Threats : October 30, 2017, Dallas, TX, USA
- MTD '15 : proceedings of the second ACM Workshop on Moving Target Defense : October 12, 2015, Denver, Colorado, USA
- MTD '16 : proceedings of the 2016 ACM Workshop on Moving Target Defense : October 24, 2016, Vienna, Austria
- MTD '17 : proceedings of the 2017 Workshop on Moving Target Defense : October 30, 2017, Dallas, TX, USA
- Opening information horizons : 6th ACM/IEEE-CS Joint Conference on Digital Libraries
- PST 2017 : 15th Annual Conference on Privacy, Security and Trust : 27-29 August 2017, Calgary, Canada
- PST : 2018 16th Annual Conference on Privacy, Security and Trust : August 28-30, 2018, Belfast, Northern Ireland, United Kingdom
- Privacy in location-based applications : research issues and emerging trends
- Proceedings
- Proceedings of ... ACM Symposium on Access Control Models and Technologies : SACMAT ...
- Proceedings of Eighth ACM Symposium on Access Control Models and Technologies : SACMAT 2003 : June 2-3, 2003, Villa Gallia, Como, Italy
- Proceedings of Ninth ACM Symposium on Access Control Models and Technologies : SACMAT 2004 : June 2-4, 2004, Yorktown Heights, New York, USA
- Proceedings of Seventh ACM Symposium on Access Control Models and Technologies : SACMAT 2002 : June 3-4, 2002, Naval Postgraduate School, Monterey, California, USA
- Proceedings of the ... IEEE Symposium on Security and Privacy
- Proceedings of the ... IEEE Symposium on Security and Privacy
- Proceedings of the ... IEEE Symposium on Security and Privacy
- Proceedings of the 2008 IEEE Symposium on Security and Privacy : May 18-21, 2008, Oakland, California, USA
- Proceedings of the 2009 30th IEEE Symposium on Security and Privacy : 17-20 May 2009, Berkeley, CA, US
- Proceedings, Fifth ACM Workshop on Role-Based Access Control : Berlin, Germany, July 26-27, 2000
- Proceedings, Fourth ACM Workshop on Role-Based Access Control : Fairfax, Virginia, USA, October 28-29, 1999
- Public key cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001 : proceedings /c Kwangjo Kim (ed.)
- Public key cryptography : 4th [i.e. 5th] International Workshop on Practice and Theory in Public Key Cryptosystems [i.e. Cryptography], PKC 2002, Paris, France, February 12-14, 2002 : proceedings
- Public key cryptography : PKC 2007 : 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007 : proceedings
- Public key cryptography : PKC 2008 : 11th International Workshop on Practice and Theory in Public Key Cryptography, Barcelona, Spain, March 9-12, 2008 : proceedings
- Public key cryptography : first International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998 : proceedings
- Public key cryptography : second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999 : proceedings
- Public key cryptography : third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000 : proceedings
- Public key cryptography, PKC 2003 : 6th International Workshop on Practice and Theory in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003 : proceedings
- Public key cryptography, PKC 2004 : 7th International Workshop on Practice and Theory in Public Key Cryptography, Singapore, March 1-4, 2004 : proceedings
- Public key cryptography, PKC 2005 : 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings
- Public key cryptography, PKC 2006 : 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006 : proceedings
- Public-key cryptography : American Mathematical Society short course, January 13-14, 2003, Baltimore, Maryland
- Recent advances in intrusion detection : 11th international symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008 : proceedings
- Recent advances in intrusion detection : 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 : proceedings
- Recent advances in intrusion detection : 5th internatonal symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002 : proceedings
- Recent advances in intrusion detection : 6th international symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003 : proceedings
- Recent advances in intrusion detection : 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004 : proceedings
- Recent advances in intrusion detection : 8th international symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005 : revised papers
- S & P 2007 : proceedings : 2007 IEEE Symposium on Security and Privacy : 20-23 May 2007, Berkeley, California
- SACMAT '07 : proceedings of the 12th ACM Symposium on Access Control Models and Technologies : Sophia Antipolis, France, June 20-22, 2007
- SACMAT '08 : proceedings of the 13th ACM Symposium on Access Control Models and Technologies : Estes Park, Colorado, USA, June 11-13, 2008
- SACMAT '09: proceedings of the 14th ACM Symposium on Access Control Models and Technologies : Stresa, Italy, June 3-5, 2009
- SACMAT '10 : Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, June 9-11, 2010, Pittsburgh, Pennsylvania, USA
- SACMAT '15 : proceedings of the 20th ACM Symposium on Access Control Models and Technologies : June 1-3, 2015, Vienna, Austria.
- SACMAT '16 : proceedings of the 21st ACM Symposium on Access Control Models and Technologies : June 6-8, 2016, Shanghai, China
- SACMAT '17 : proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies : June 21-23, 2017, Indianapolis, IN, USA
- SACMAT 2005 : proceedings of Tenth ACM Symposium on Access Control Models and Technologies : June 1-3, 2005, Stockholm, Sweden
- Secure data management : 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007 : proceedings
- Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008 ; proceedings
- Secure data management : VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004 : proceedings
- Secure data management : second VLDB workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings
- Security protocols : 10th international workshop, Cambridge, UK, April 17-19, 2002 : revised papers
- Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers
- Security protocols : 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
- Security protocols : 5th international workshop, Paris, France, April 7-9, 1997 : proceedings
- Security protocols : 6th international workshop, Cambridge, UK, April 15-17, 1998 : proceedings
- Security protocols : 7th international workshop, Cambridge, UK, April 19-21, 1999 : proceedings
- Security protocols : 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers
- Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers
- Security protocols : international workshop, Cambridge, United Kingdom, April 10-12, 1996 : proceedings
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/6NEuY16CGHg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/6NEuY16CGHg/">Computers -- Access control -- Congresses</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computers -- Access control -- Congresses
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/6NEuY16CGHg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/6NEuY16CGHg/">Computers -- Access control -- Congresses</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>