Basic Search / Search Result

  • Search Result: 7results Search Strategy: "Yuan-Cheng Lai".ecommittee (Phrase) and ekeyword.raw="Access Control"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Sound Recording and Accessing System based on Microphone Jamming and Active Noise Cancellation

    2

    A Self-Adaptive and Efficient Algorithm to Achieve Strong Consistency in Federated Identity Management Systems
    • Department of Information Management /96/ Master
    • Author: Hua-peng Lin Advisor: Shi-Cho Cha
    • In recent years, Federated Identity Management (FIM) systems play an important role to allow users …
    • Clicks: 385Downloads: 0
    • Full text public date 2013/07/23 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    3

    A study on ciphertext-policy attribute-based encryption for data sharing in cloud storage

    4

    On design a User-friendly Interface for Risk-based Access Control Policy Management

    5

    Self-Supervised Learning for Dynamically Updating Attribute-Based Access Control Policies: A Realization of Zero Trust Environment
    • Department of Computer Science and Information Engineering /112/ Master
    • Author: Yen-Ting Chen Advisor: Hsing-Kuo Pao
    • In the era of big data, the resources that need to be managed within an organization are rapidly in…
    • Clicks: 286Downloads: 0
    • Full text public date 2026/08/26 (Intranet public)
    • Full text public date 2027/08/26 (Internet public)
    • Full text public date 2027/08/26 (National library)

    6

    An Efficient Way to Implement RBAC Systems with Template
    • Department of Information Management /96/ Master
    • Author: Chun-wen Huang Advisor: Shi-Cho Cha
    • Access control has played an important role to achieve security in organizations. While there are s…
    • Clicks: 523Downloads: 2
    • Full text public date This full text is not authorized to be published. (Internet public)

    7

    Considering Efficiency and System Diversity in Federated Identity and Access Management Systems
    1