Search alternatives:
decentralized wireless » centralized wireless, centralised wireless, decentralized business
decentralized prozess » decentralized power, decentralized pomdps, decentralized problem
decentralized process » decentralized privacy
decentralized access » decentralized agent, decentralized business, decentralized cloud
wireless management » awareness management, witness management, wilderness management
prozess management » prozessmanagement _
process management » processing management

1
Published 2007
Springer US
Table of Contents: ...Foundation -- Basic Security Concepts -- Access Control Policies and Languages in Open Environments...

2
by Pinto, Rohan
Published 2024
Packt Publishing, Limited
Table of Contents: ...Traditional access control for web applications -- Access management -- Access management versus...

3
by Mewes, Katharina
Published 2011
VS Verlag für Sozialwissenschaften
Subjects: ...Environmental management...

4
Published 2006
Springer Berlin Heidelberg
Table of Contents: ...Peer-to-Peer and Semantic Web -- Peer-to-Peer and Semantic Web -- Data Storage and Access -- An RDF...

5
by Mukhopadhyay, Mayukh
Published 2018
Packt Publishing
Table of Contents: ... of decentralization -- The Ethereum ecosystem -- Mist -- Decentralized applications -- Middleware -- Swarm -- Whisper...

6
Published 2022
Springer International Publishing
Table of Contents: ...Methods for Privacy Support in the Decentralized Environment -- Application of Bluetooth, Wi-Fi...

7
by Webb, B. Steven
Published 1999
The World Bank
Subjects: ...Decentralization Process...

8
Published 2020
Springer International Publishing
Table of Contents: ...) -- Decentralized Data Access with IPFS and Smart Contract Permission Management for Electronic Health Records...

9
by Dinar, Ariel
Published 2005
World Bank
Subjects: ...Decentralization in management / Case studies...

10
by Hill, Brenn, Chopra, Samanyu, Valencourt, Paul
Published 2018
Packt Publishing
Table of Contents: ... -- Hierarchical deterministic wallets -- Mnemonic codes -- Key generation process in HD wallets -- Child key...

11
by Ben-Shaul, I., Kaiser, Gail E.
Published 1995
Springer US
Table of Contents: ...1 Introduction -- 1.1 Process Modeling -- 1.2 Why Decentralization ? -- 1.3 A Motivating Example...

12
by Yang, Ming, Yang, Fan
Published 2012
Springer London
Subjects: ...Energy Policy, Economics and Management...

13
by Jakimow, Tanya
Published 2015
Palgrave Macmillan UK
Subjects: ...Sustainability Management...

14
Published 2024
Springer International Publishing
Table of Contents: ...Introduction: Blockchain, Decentralized Finance and Entrepreneurship 9 -- DeFi and Investing...

15
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...? -- Comparative Analysis of Case Studies -- Determinants of River Basin Management Decentralization: Motivation...

16
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... -- Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors -- Lazy Security Controllers -- Access...

17
Published 2016
Springer International Publishing
Table of Contents: ...Regulation and Control Processes in Ecosystems -- Control and Management of Man-Made Systems...

18
by Ahmad, Ehtisham
Published 2006
International Monetary Fund
Subjects: ...Debt Management...

19
Published 2007
Springer US
Table of Contents: ... -- Analysis of the implicit trust within the OLSR protocol -- Validating a Trust-based Access Control System...

20
by Giansanti, Daniele
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...wireless communication...