Computers -- Access control
Resource Information
The concept Computers -- Access control represents the subject, aboutness, idea or notion of resources found in Boston University Libraries.
The Resource
Computers -- Access control
Resource Information
The concept Computers -- Access control represents the subject, aboutness, idea or notion of resources found in Boston University Libraries.
- Label
- Computers -- Access control
- Authority link
-
- http://id.worldcat.org/fast/00872779
- (uri) http://id.worldcat.org/fast/fst00872779
- Source
- fast
89 Items that share the Concept Computers -- Access control
Context
Context of Computers -- Access controlSubject of
No resources found
No enriched resources found
- ... Annual International Conference on Privacy, Security and Trust.
- ACM SIGSAC review
- Advances in information and computer security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008, proceedings
- Approaches to cyber intrusion response : report to the President's Commission on Critical Infrastructure Protection
- Children's Internet Protection Act : report of the Committee on Commerce, Science, and Transportation on S. 97
- China's cyber-wall : can technology break through? : roundtable before the Congressional-Executive Commission on China, One Hundred Seventh Congress, second session, November 4, 2002
- Computer Matching and Privacy Protection Act of 1987 : hearing before a subcommittee of the Committee on Government Operations, House of Representatives, One hundredth Congress, first session, on S. 496 ... June 23, 1987
- Computer fraud & security
- Computer fraud and security bulletin
- Computer security -- ESORICS 2009 : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009 : proceedings
- Computer security--ESORICS 2006 : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006 : proceedings
- Computer security--ESORICS 2010 : 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010 : proceedings
- Critical Infrastructure Protection: Significant Challenges in Developing National Capabilities
- Critical information infrastructures security : second international workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007 : revised papers
- Critical infrastructure protection : national plan for information systems protection
- Critical infrastructure protection : significant challenges in developing analysis, warning, and response capabilities
- Critical infrastructure protection : significant challenges in protecting federal systems and developing analysis and warning capabilities
- Critical infrastructures : background and early implementation of PDD-63
- Critical infrastructures : background, policy, and implementation
- Cryptography and communications : discrete structures, Boolean functions and sequences
- Cryptology and computational number theory
- Cyber-nationalism in China : challenging Western media portrayals of internet censorship in China
- Cybersecurity : current legislation, executive branch initiatives, and options for Congress
- EDPACS : the EDP audit, control and security newsletter
- Encryption export controls
- Fast software encryption : 16th international workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009 ; revised selected papers
- Fourth Amendment and the Internet : hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session, April 6, 2000
- Fourth Amendment issues raised by the FBI's "Carnivore" program : hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session
- H.R. 4246, the Cyber Security Information Act of 2000 : an examination of issues involving public-private partnerships for critical infrastructures : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, on H.R. 4246 ... June 22, 2000
- H.R. 695, Security and Freedom through Encryption (SAFE) Act : markup before the Subcommittees on International Economic Policy and Trade of the Committee on International Relations, House of Representatives, One Hundred Fifth Congress, first session, June 24, 1997
- H.R. 695, the Security and Freedom through Encryption (SAFE) Act : markup before the Committee on International Relations, House of Representatives, One Hundred Fifth Congress, first session, July 22, 1997
- H.R. 695, the Security and Freedom through Encryption Act : Committee on National Security, House of Representatives, One Hundred Fifth Congress, first session : hearing held July 30, 1997
- Hacking the homeland : investigating cybersecurity vulnerabilities at the Department of Homeland Security : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, June 20, 2007
- INFORMATION SECURITY: Computer Attacks at Department of Defense Pose Increasing Risks
- Implementation of the Computer Security Act : hearing before the Subcommittee on Transportation, Aviation, and Materials and the Subcommittee on Science, Research, and Technology of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred First Congress, first session, March 21, 1989
- Implementation of the Computer Security Act : hearing before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, House of Representatives, One Hundredth Congress, second session, September 22, 1988
- Information security : 11th international conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008 : proceedings
- Information security : 12th international conference, ISC 2009, Pisa, Italy, September 7-9, 2009 ; proceedings
- Information security : 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010 : revised selected papers
- Information security : 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001 : proceedings
- Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings
- Information security : Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 6-7, 1999 : proceedings
- Information security : despite reported progress, federal agencies need to address persistent weaknesses
- Information security : first international workshop, ISW '97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997 : proceedings
- Information security : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, September 23, 1998
- Information security : third international workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000 : proceedings
- Information security and privacy : 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008 : proceedings
- Information security applications : 11th international workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010 : revised selected papers
- Information security in the federal government : one year into the Federal Information Security Management Act : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, March 16, 2004
- Information systems security : third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings
- International journal of information security science
- Journal of computer security
- Password sharing may be a federal crime : Nosal part I
- Privacy in location-based applications : research issues and emerging trends
- Proceedings
- Proceedings of the ... IEEE Symposium on Security and Privacy
- Proceedings of the ... IEEE Symposium on Security and Privacy
- Proceedings of the ... IEEE Symposium on Security and Privacy
- Progress in cryptology--LATINCRYPT 2010 : first International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010 : proceedings
- Public key cryptography : 4th [i.e. 5th] International Workshop on Practice and Theory in Public Key Cryptosystems [i.e. Cryptography], PKC 2002, Paris, France, February 12-14, 2002 : proceedings
- Public key cryptography : PKC 2007 : 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007 : proceedings
- Public key cryptography : PKC 2008 : 11th International Workshop on Practice and Theory in Public Key Cryptography, Barcelona, Spain, March 9-12, 2008 : proceedings
- Public key cryptography : first International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998 : proceedings
- Public key cryptography : second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999 : proceedings
- Public key cryptography : third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000 : proceedings
- Public key cryptography--PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings
- Recent advances in intrusion detection : 10th international symposium, RAID 2007, Gold Goast [i.e. Coast], Australia, September 5-7, 2007 : proceedings
- Recent advances in intrusion detection : 11th international symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008 : proceedings
- Recent advances in intrusion detection : 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 : proceedings
- S. 97, The Children's Internet Protection Act : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, first session, March 4, 1999
- S. 97, the Children's Internet Protection Act : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, first session, March 4, 1999
- S. 97, the Children's Internet Protection Act : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, first session, May 20, 1999
- SC magazine
- SIG security, audit & control review
- Secure data management : 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007 : proceedings
- Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008 ; proceedings
- Secure data management : 7th VLDB workshop, SDM 2010, Singapore, September 17, 2010 : proceedings
- Secure data management : 8th VLDB workshop, SDM 2011, Seattle, WA, USA, September 2, 2011 : proceedings
- Security and Freedom through Encryption (SAFE) Act : report together with additional views (to accompany H.R. 850) (including cost estimate of the Congressional Budget Office)
- Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
- Security protocols : 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
- Security protocols : 5th international workshop, Paris, France, April 7-9, 1997 : proceedings
- Security protocols : 6th international workshop, Cambridge, UK, April 15-17, 1998 : proceedings
- Security protocols : 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers
- Security protocols : 9th international workshop, Cambridge, UK, April 25-27, 2001 : revised papers
- Security protocols : international workshop, Cambridge, United Kingdom, April 10-12, 1996 : proceedings
- The Security and Freedom through Encryption (SAFE) Act : hearing before the Subcommittee on Telecommunications, Trade, and Consumer Protection of the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, first session, on H.R. 850, May 25, 1999
- The federal role in electronic authentication : hearing before the Subcommittee on Domestic and International Monetary Policy of the Committee on Banking and Financial Services, House of Representatives, One Hundred Fifth Congress, first session, July 9, 1997
- U.S. encryption policy : hearing before the Committee on Armed Services, House of Representatives, One Hundred Sixth Congress, first session : hearings held July 1, 13, 1999
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/Z-wzygtpVWI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/Z-wzygtpVWI/">Computers -- Access control</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computers -- Access control
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/resource/Z-wzygtpVWI/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/resource/Z-wzygtpVWI/">Computers -- Access control</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>