Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.118
1.
  • Database security - concept... Database security - concepts, approaches, and challenges
    Bertino, E.; Sandhu, R. IEEE transactions on dependable and secure computing, 2005-Jan.-March, 2005-01-00, 20050101, Letnik: 2, Številka: 1
    Journal Article
    Odprti dostop

    As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and ...
Celotno besedilo
Dostopno za: CEKLJ, IJS, NUK, UL

PDF
2.
  • International standards for... International standards for early fetal size and pregnancy dating based on ultrasound measurement of crown–rump length in the first trimester of pregnancy
    Papageorghiou, A. T.; Kennedy, S. H.; Salomon, L. J. ... Ultrasound in obstetrics & gynecology, December 2014, Letnik: 44, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    ABSTRACT Objectives There are no international standards for relating fetal crown–rump length (CRL) to gestational age (GA), and most existing charts have considerable methodological limitations. The ...
Celotno besedilo
Dostopno za: BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK

PDF
3.
  • A generalized temporal role... A generalized temporal role-based access control model
    Joshi, J.B.D.; Bertino, E.; Latif, U. ... IEEE transactions on knowledge and data engineering, 2005-Jan., 2005, 2005-01-00, 20050101, Letnik: 17, Številka: 1
    Journal Article
    Recenzirano

    Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management. In many practical scenarios, users may ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
4.
  • Watermarking Relational Dat... Watermarking Relational Databases Using Optimization-Based Techniques
    Shehab, M.; Bertino, E.; Ghafoor, A. IEEE transactions on knowledge and data engineering, 2008-Jan., 2008, 2008-01-00, 20080101, Letnik: 20, Številka: 1
    Journal Article
    Recenzirano

    Proving ownership rights on outsourced relational databases is a crucial issue in today's internet-based application environments and in many content distribution applications. In this paper, we ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
5.
  • The objectives, design and ... The objectives, design and implementation of the INTERGROWTH‐21st Project
    Villar, J; Altman, DG; Purwar, M ... BJOG : an international journal of obstetrics and gynaecology, September 2013, 2013-Sep, 20130901, Letnik: 120, Številka: s2
    Journal Article
    Recenzirano
    Odprti dostop

    Please cite this paper as: Villar J, Altman D, Purwar M, Noble J, Knight H, Ruyan P, Cheikh Ismail L, Barros F, Lambert A, Papageorghiou A, Carvalho M, Jaffer Y, Bertino E, Gravett M, Bhutta Z, ...
Celotno besedilo
Dostopno za: BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK

PDF
6.
  • Secure interoperation in a ... Secure interoperation in a multidomain environment employing RBAC policies
    Shafiq, B.; Joshi, J.B.D.; Bertino, E. ... IEEE transactions on knowledge and data engineering, 11/2005, Letnik: 17, Številka: 11
    Journal Article
    Recenzirano

    Multidomain application environments where distributed multiple organizations interoperate with each other are becoming a reality as witnessed by emerging Internet-based enterprise applications. ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
7.
  • Trust-X: A Peer-to-Peer Fra... Trust-X: A Peer-to-Peer Framework for Trust Establishment
    Bertino, E.; Ferrari, E.; Squicciarini, A.C. IEEE transactions on knowledge and data engineering, 01/2004, Letnik: 16, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    We present Trust-X; , a comprehensive XML-based framework for trust negotiations, specifically conceived for a peer-to-peer environment. Trust negotiation is a promising approach for establishing ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
8.
  • A Decentralized Privacy Pre... A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
    Hasan, O.; Brunie, L.; Bertino, E. ... IEEE transactions on information forensics and security, 06/2013, Letnik: 8, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    Users hesitate to submit negative feedback in reputation systems due to the fear of retaliation from the recipient user. A privacy preserving reputation protocol protects users by hiding their ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
9.
  • Quality control of ultrasou... Quality control of ultrasound for fetal biometry: results from the INTERGROWTH‐21st Project
    Cavallaro, A.; Ash, S. T.; Napolitano, R. ... Ultrasound in obstetrics & gynecology, September 2018, 20180901, Letnik: 52, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    ABSTRACT Objective To assess a comprehensive package of ultrasound quality control in the Fetal Growth Longitudinal Study of the INTERGROWTH‐21st Project, a large multicenter study of fetal growth. ...
Celotno besedilo
Dostopno za: BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SBCE, SBMB, UL, UM, UPUK

PDF
10.
  • Security Analysis of the SA... Security Analysis of the SASI Protocol
    Tianjie Cao; Bertino, E.; Hong Lei IEEE transactions on dependable and secure computing, 2009-Jan.-March, 2009-01-00, 20090101, Letnik: 6, Številka: 1
    Journal Article

    The ultralightweight RFID protocols only involve simple bit-wise operations (like XOR, AND, OR, etc.) on tags. In this paper, we show that the ultralightweight strong authentication and strong ...
Celotno besedilo
Dostopno za: CEKLJ, IJS, NUK, UL
1 2 3 4 5
zadetkov: 1.118

Nalaganje filtrov