Automatic Firewalls’ Configuration Using Argumentation Reasoning
Gespeichert in:
Veröffentlicht in: | ETAA (3. : 2020 : Online) Emerging technologies for authorization and authentication |
---|---|
1. Verfasser: | |
Weitere Verfasser: | |
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
2020
|
Schlagworte: | |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Titel | Jahr | Verfasser |
---|---|---|
IFTTT Privacy Checker | 2020 | Paci, Federica |
Advanced Authentication for the Web | 2020 | Christou, Neophytos |
A Comparison Among Policy Editors for Attributed Based Access Control Model | 2020 | Martinelli, Fabio |
Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native Applications | 2020 | Sharif, Amir |
An Interoperable Architecture for Usable Password-Less Authentication | 2020 | Casey, Matthew |
Deep Leaming Based Sequential Mining for User Authentication in Web Applications | 2020 | Levi, Matan |
The Cost of Having Been Pwned: A Security Service Provider's Perspective | 2020 | Biczók, Gergely |
Micro-Id-Gym: A Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory | 2020 | Bisegna, Andrea |
Automatic Firewalls’ Configuration Using Argumentation Reasoning | 2020 | Karafıli, Erisa |
On Results of Data Aggregation Operations | 2020 | Cerbo, Francesco Di |