Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Access control.

Zeitschriftenartikel zum Thema „Access control“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Access control" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Chepuru, Anitha, Dr K. Venugopal Rao, and Amardeep Matta. "Server Access Control." International Journal of Scientific Research 1, no. 7 (2012): 78–79. http://dx.doi.org/10.15373/22778179/dec2012/31.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Saunders, G., M. Hitchens, and V. Varadharajan. "Role-based access control and the access control matrix." ACM SIGOPS Operating Systems Review 35, no. 4 (2001): 6–20. http://dx.doi.org/10.1145/506084.506085.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Abd-Ali, Jamal. "A Metamodel for Hybrid Access Control Policies." Journal of Software 10, no. 7 (2015): 784–87. http://dx.doi.org/10.17706//jsw.10.7.784-797.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Penelova, Maria. "Access Control Models." Cybernetics and Information Technologies 21, no. 4 (2021): 77–104. http://dx.doi.org/10.2478/cait-2021-0044.

Der volle Inhalt der Quelle
Annotation:
Abstract Access control is a part of the security of information technologies. Access control regulates the access requests to system resources. The access control logic is formalized in models. Many access control models exist. They vary in their design, components, policies and areas of application. With the developing of information technologies, more complex access control models have been created. This paper is concerned with overview and analysis for a number of access control models. First, an overview of access control models is presented. Second, they are analyzed and compared by a nu
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Schuldt, Alison. "PAR access control." Nature Reviews Molecular Cell Biology 12, no. 11 (2011): 693. http://dx.doi.org/10.1038/nrm3220.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Subramanian, Savithri. "Control and access." Contributions to Indian Sociology 42, no. 1 (2008): 93–122. http://dx.doi.org/10.1177/006996670704200105.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Friedman, Michael. "Access-control software." Computers & Security 7, no. 5 (1988): 523. http://dx.doi.org/10.1016/0167-4048(88)90293-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Collinson, Helen. "Workstation access control." Computers & Security 14, no. 2 (1995): 121. http://dx.doi.org/10.1016/0167-4048(95)90061-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Yaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures." Information Resources Management Journal 30, no. 4 (2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.

Der volle Inhalt der Quelle
Annotation:
Almost all computing systems and applications in organizations include some form of access control mechanisms. Managing secure access to computing resources is an important but a challenging task, requiring both administrative and technical measures. This study examines the influence of administrative access control measures on technical access control mechanisms. Based on the four access control clauses defined by ISO/IEC27002, this study develops a model to empirically test the impact of access control policies on systems and applications control activities. The study employs Partial Least S
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ikponmwosa, Oghogho, Otuagoma S., Ufuoma Jeffrey Okieke, et al. "FACE RECOGNITION SYSTEM FOR AUTOMATIC DOOR ACCESS CONTROL." Engineering and Technology Journal 08, no. 02 (2023): 1981–85. http://dx.doi.org/10.47191/etj/v8i2.03.

Der volle Inhalt der Quelle
Annotation:
A face recognition system for automatic door access control has been developed in this work with a view to providing a relatively more robust and foolproof access control which can provide better security and reduce human errors inherent in other conventional methods. The system was designed with machine learning and artificial intelligence to capture faces, train faces with machine mode, and run trained faces to grant access to the user. The system uses the RaspberryPi module, camera module, servo motor and the GSM module which were all incorporated into the fabricated building to make up the
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Zuva, T. "Hybridization of Bimodal Biometrics for Access Control Authentication." International Journal of Future Computer and Communication 3, no. 6 (2014): 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Shuriya.b, Shuriya b. "Role based Access Control using Cp-Abe Algorithm." Indian Journal of Applied Research 4, no. 7 (2011): 171–72. http://dx.doi.org/10.15373/2249555x/july2014/51.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Vinay, Kamisetty. "Blockchain Based Access Control System for Cloud Storage." International Journal of Science and Research (IJSR) 11, no. 12 (2022): 143–44. http://dx.doi.org/10.21275/sr221202104520.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

KAINZ, Ondrej, Ján DROZD, Miroslav MICHALKO, and František JAKAB. "RASPBERRY PI-BASED ACCESS CONTROL USING FACE RECOGNITION." Acta Electrotechnica et Informatica 19, no. 4 (2020): 15–20. http://dx.doi.org/10.15546/aeei-2019-0025.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Zhou, Zhenji, Lifa Wu, and Zheng Hong. "Context-Aware Access Control Model for Cloud Computing." International Journal of Grid and Distributed Computing 6, no. 6 (2013): 1–12. http://dx.doi.org/10.14257/ijgdc.2013.6.6.01.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Karjoth, Günter. "Access control with IBM Tivoli access manager." ACM Transactions on Information and System Security 6, no. 2 (2003): 232–57. http://dx.doi.org/10.1145/762476.762479.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

R. Bauer Mengelberg, Juan. "Teaching System Access Control." Issues in Informing Science and Information Technology 2 (2005): 139–58. http://dx.doi.org/10.28945/817.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.

Der volle Inhalt der Quelle
Annotation:
Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Baláž, Anton, Branislav Madoš, and Michal Ambróz. "Android Access Control Extension." Acta Informatica Pragensia 4, no. 3 (2015): 310–17. http://dx.doi.org/10.18267/j.aip.77.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Hamby, Sherry. "Coercion, Access, and Control." Criminal Justice Review 43, no. 1 (2018): 5–9. http://dx.doi.org/10.1177/0734016817751581.

Der volle Inhalt der Quelle
Annotation:
This special issue on drugging presents five articles that make important contributions to this still emerging literature. Although historical incidents of drugging, which is the nonconsensual administration of psychoactive substances, have been documented for decades, scientific scholarship on this phenomenon is relatively new. These articles provide in-depth consideration of conceptual issues around this behavior, which can be difficult to detect and is not always perceived as an offense by young adults. The authors also contribute important new quantitative and qualitative data on a range o
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Ye, Shuiming, Ying Luo, Jian Zhao, and Sen-ChingS Cheung. "Anonymous Biometric Access Control." EURASIP Journal on Information Security 2009, no. 1 (2009): 865259. http://dx.doi.org/10.1186/1687-417x-2009-865259.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Toledo, Rodolfo, Angel Nunez, Eric Tanter, and Jacques Noye. "Aspectizing Java Access Control." IEEE Transactions on Software Engineering 38, no. 1 (2012): 101–17. http://dx.doi.org/10.1109/tse.2011.6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Toledo, Rodolfo, and Eric Tanter. "Access Control in JavaScript." IEEE Software 28, no. 5 (2011): 76–84. http://dx.doi.org/10.1109/ms.2010.154.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Alhamdani, Wasim A. "Resilent Access Control Model." Journal of Applied Security Research 12, no. 4 (2017): 478–96. http://dx.doi.org/10.1080/19361610.2017.1354273.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Barker, Steve, Marek J. Sergot, and Duminda Wijesekera. "Status-Based Access Control." ACM Transactions on Information and System Security 12, no. 1 (2008): 1–47. http://dx.doi.org/10.1145/1410234.1410235.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

КОРЧИНСЬКИЙ, ВОЛОДИМИР, ІРИНА ТАРАСЕНКО, СЕРГІЙ РАЦИБОРИНСЬКИЙ, ОЛЕКСАНДР АКАЄВ, and АРТЕМ ХАДЖИОГЛО. "AUTOMATED ACCESS CONTROL SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 333, no. 2 (2024): 140–45. http://dx.doi.org/10.31891/2307-5732-2024-333-2-22.

Der volle Inhalt der Quelle
Annotation:
The paper provides an overview and analysis of the problems in the application of automated access control systems based on NFC. The capabilities of the Arduino platform are investigated and an access control system with an RFID-NFC module is developed on its basis. The use of automated access control systems in the modern world is becoming increasingly relevant. It involves a number of benefits that such systems can bring to businesses and other entities. These systems simplify and speed up the process of identifying a person, save time and increase the efficiency of security services, but st
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Stevens, Gunnar, and Volker Wulf. "Computer-supported access control." ACM Transactions on Computer-Human Interaction 16, no. 3 (2009): 1–26. http://dx.doi.org/10.1145/1592440.1592441.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Stankovski, Stevan, Gordana Ostojic, Nikola Djukic, Srdjan Tegeltija, and Aleksandar Milojkovic. "Bluetooth parking access control." Sensor Review 34, no. 3 (2014): 244–54. http://dx.doi.org/10.1108/sr-06-2012-643.

Der volle Inhalt der Quelle
Annotation:
Purpose – The purpose of this paper is to describe an approach of using mobile phones with Bluetooth technology to enter/exit restricted area. Design/methodology/approach – Applied Bluetooth technology implemented in mobile phones enables the user to perform the identification and the state of presence while entering/exiting the parking space without stopping the vehicle. For the successful implementation of this method for presence detection and proper identification, it is necessary to determine the values of the Bluetooth signal. Findings – This paper discuses a case study that has been don
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Hu, Vincent C., D. Richard Kuhn, and David F. Ferraiolo. "Attribute-Based Access Control." Computer 48, no. 2 (2015): 85–88. http://dx.doi.org/10.1109/mc.2015.33.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Moffett, Jonathan D., and Morris S. Sloman. "Content-dependent access control." ACM SIGOPS Operating Systems Review 25, no. 2 (1991): 63–70. http://dx.doi.org/10.1145/122120.122125.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Hu, Vincent C., and Rick Kuhn. "Access Control Policy Verification." Computer 49, no. 12 (2016): 80–83. http://dx.doi.org/10.1109/mc.2016.368.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Nicola, Rocco De, GianLuigi Ferrari, Rosario Pugliese, and Betti Venneri. "Types for access control." Theoretical Computer Science 240, no. 1 (2000): 215–54. http://dx.doi.org/10.1016/s0304-3975(99)00232-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Murray, Bill. "Security and access control." Computer Fraud & Security Bulletin 1992, no. 12 (1992): 10–15. http://dx.doi.org/10.1016/s0142-0496(09)90145-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Parker, T. A. "Network access control developments." Computer Audit Update 1990, no. 6 (1990): 3–10. http://dx.doi.org/10.1016/s0960-2593(05)80056-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Jackson, Keith. "Horatius access control system." Computer Fraud & Security Bulletin 11, no. 6 (1989): 17–19. http://dx.doi.org/10.1016/0142-0496(89)90204-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Gan, Guohua, E. Chen, Zhiyuan Zhou, and Yan Zhu. "Token-Based Access Control." IEEE Access 8 (2020): 54189–99. http://dx.doi.org/10.1109/access.2020.2979746.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Domingo-Ferrer, Joseph. "Algorithm- sequenced access control." Computers & Security 10, no. 7 (1991): 639–52. http://dx.doi.org/10.1016/0167-4048(91)90122-t.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Parker, Tom. "Role based access control." Computers & Security 14, no. 5 (1995): 418. http://dx.doi.org/10.1016/0167-4048(95)97115-q.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Bhatia, Rekha, and Manpreet Singh Gujral. "Privacy Aware Access Control." International Journal of Information Technologies and Systems Approach 10, no. 2 (2017): 17–30. http://dx.doi.org/10.4018/ijitsa.2017070102.

Der volle Inhalt der Quelle
Annotation:
Due to the ever increasing number of web services available through the Internet, the privacy as a fundamental human right is endangered. Informed consent and collection of information are two important aspects while interacting on the Internet through web services. The ease of data access and the ready availability of it through Internet, made it easier for interested parties to intrude into the individual's privacy in unprecedented ways. The regulatory and technical solutions adopted to curb this have achieved only a limited success. The main culprits in this regard are the incompatibilities
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Ye, Shuiming, Ying Luo, Jian Zhao, and Sen-Ching S. Cheung. "Anonymous Biometric Access Control." EURASIP Journal on Information Security 2009 (2009): 1–17. http://dx.doi.org/10.1155/2009/865259.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

КОРЧИНСЬКИЙ, ВОЛОДИМИР, ІРИНА ТАРАСЕНКО, СЕРГІЙ РАЦИБОРИНСЬКИЙ, ОЛЕКСАНДР АКАЄВ, and АРТЕМ ХАДЖИОГЛО. "AUTOMATED ACCESS CONTROL SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 331, no. 1 (2024): 291–96. http://dx.doi.org/10.31891/2307-5732-2024-331-44.

Der volle Inhalt der Quelle
Annotation:
The paper provides an overview and analysis of the problems in the application of automated access control systems based on NFC. The capabilities of the Arduino platform are investigated and an access control system with an RFID-NFC module is developed on its basis. The use of automated access control systems in the modern world is becoming increasingly relevant. It involves a number of benefits that such systems can bring to businesses and other entities. These systems simplify and speed up the process of identifying a person, save time and increase the efficiency of security services, but st
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

DUNDUA, Besik, Khimuri RUKHAIA, Mikheili RUKHAIA та Lali TIBUA. "PρLog for Access Control". Journal of Technical Science and Technologies 5, № 2 (2017): 41–44. http://dx.doi.org/10.31578/jtst.v5i2.108.

Der volle Inhalt der Quelle
Annotation:
In this article we show how access control policies can be expressed in PρLog,which is a system for programming with conditional transformation rules, controlledby strategies. PρLog combines the power of logic programming withrewriting, which makes it convenient to reason about the policies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Kim, Jinsu, and Namje Park. "Role Based Access Control based File Access Control Mechanism with Smart Contract." Journal of Korean Institute of Information Technology 17, no. 9 (2019): 113–21. http://dx.doi.org/10.14801/jkiit.2019.17.9.113.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Bertolino, Antonia, Said Daoudagh, Francesca Lonetti, Eda Marchetti, and Louis Schilders. "Automated testing of eXtensible Access Control Markup Language‐based access control systems." IET Software 7, no. 4 (2013): 203–12. http://dx.doi.org/10.1049/iet-sen.2012.0101.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Lobo, Jorge. "Relationship-based access control: More than a social network access control model." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 9, no. 2 (2018): e1282. http://dx.doi.org/10.1002/widm.1282.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Danilescu, Marcel. "MODELING ACCESS CONTROL AND USER ACTIONS USING TRUST - BASED ACCESS CONTROL POLICIES." Journal of Social Sciences III (3) (September 1, 2020): 72–84. https://doi.org/10.5281/zenodo.3971967.

Der volle Inhalt der Quelle
Annotation:
This paper is a natural continuation of previous research on the implementation of confidentiality in small, medium, and virtual enterprises. This research began in 2009, with the work "Xml Based Techniques for Data Privacy in E-Business" which revealed that for small, medium, and virtual enterprises that often represent start-ups, trust is a basic element. Thus, in 2010, we published the paper "Control access to information by applying policies based on trust hierarchies". Present work shows a method of modeling the hierarchies of trust in computer systems. After a review
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Lijun Chen, S. H. Low, and J. C. Doyle. "Random Access Game and Medium Access Control Design." IEEE/ACM Transactions on Networking 18, no. 4 (2010): 1303–16. http://dx.doi.org/10.1109/tnet.2010.2041066.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Zhu, Nafei, Fangbo Cai, Jingsha He, Yixuan Zhang, Wenxin Li, and Zhao Li. "Management of access privileges for dynamic access control." Cluster Computing 22, S4 (2018): 8899–917. http://dx.doi.org/10.1007/s10586-018-2018-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Lun-wei, Wang, Liao Xiang-ke, and Wang Huai-min. "Access request trustworthiness in weighted access control framework." Wuhan University Journal of Natural Sciences 10, no. 1 (2005): 65–69. http://dx.doi.org/10.1007/bf02828619.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Danilescu, Marcel, and Victor Besliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII, no. 2 (2021): 67–78. http://dx.doi.org/10.52326/jes.utm.2021.28(2).05.

Der volle Inhalt der Quelle
Annotation:
In recent decades, the number of researches on access control and user actions in computer systems has increased. Over time, there have been two models of implementing Mandatory Access Control (MAC) policies for government institutions and Discretionary Access Control (DAC) for the business environment, policies that various access control modeling solutions seek to implement. Among the access control modeling solutions developed are Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), presented in the U.S.A. by the National Institute of Standard and Technology (NIST). I
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!