Zeitschriftenartikel zum Thema „Access control“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Access control" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Chepuru, Anitha, Dr K. Venugopal Rao, and Amardeep Matta. "Server Access Control." International Journal of Scientific Research 1, no. 7 (2012): 78–79. http://dx.doi.org/10.15373/22778179/dec2012/31.
Der volle Inhalt der QuelleSaunders, G., M. Hitchens, and V. Varadharajan. "Role-based access control and the access control matrix." ACM SIGOPS Operating Systems Review 35, no. 4 (2001): 6–20. http://dx.doi.org/10.1145/506084.506085.
Der volle Inhalt der QuelleAbd-Ali, Jamal. "A Metamodel for Hybrid Access Control Policies." Journal of Software 10, no. 7 (2015): 784–87. http://dx.doi.org/10.17706//jsw.10.7.784-797.
Der volle Inhalt der QuellePenelova, Maria. "Access Control Models." Cybernetics and Information Technologies 21, no. 4 (2021): 77–104. http://dx.doi.org/10.2478/cait-2021-0044.
Der volle Inhalt der QuelleSchuldt, Alison. "PAR access control." Nature Reviews Molecular Cell Biology 12, no. 11 (2011): 693. http://dx.doi.org/10.1038/nrm3220.
Der volle Inhalt der QuelleSubramanian, Savithri. "Control and access." Contributions to Indian Sociology 42, no. 1 (2008): 93–122. http://dx.doi.org/10.1177/006996670704200105.
Der volle Inhalt der QuelleFriedman, Michael. "Access-control software." Computers & Security 7, no. 5 (1988): 523. http://dx.doi.org/10.1016/0167-4048(88)90293-3.
Der volle Inhalt der QuelleCollinson, Helen. "Workstation access control." Computers & Security 14, no. 2 (1995): 121. http://dx.doi.org/10.1016/0167-4048(95)90061-6.
Der volle Inhalt der QuelleYaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures." Information Resources Management Journal 30, no. 4 (2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.
Der volle Inhalt der QuelleIkponmwosa, Oghogho, Otuagoma S., Ufuoma Jeffrey Okieke, et al. "FACE RECOGNITION SYSTEM FOR AUTOMATIC DOOR ACCESS CONTROL." Engineering and Technology Journal 08, no. 02 (2023): 1981–85. http://dx.doi.org/10.47191/etj/v8i2.03.
Der volle Inhalt der QuelleZuva, T. "Hybridization of Bimodal Biometrics for Access Control Authentication." International Journal of Future Computer and Communication 3, no. 6 (2014): 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.
Der volle Inhalt der QuelleShuriya.b, Shuriya b. "Role based Access Control using Cp-Abe Algorithm." Indian Journal of Applied Research 4, no. 7 (2011): 171–72. http://dx.doi.org/10.15373/2249555x/july2014/51.
Der volle Inhalt der QuelleVinay, Kamisetty. "Blockchain Based Access Control System for Cloud Storage." International Journal of Science and Research (IJSR) 11, no. 12 (2022): 143–44. http://dx.doi.org/10.21275/sr221202104520.
Der volle Inhalt der QuelleKAINZ, Ondrej, Ján DROZD, Miroslav MICHALKO, and František JAKAB. "RASPBERRY PI-BASED ACCESS CONTROL USING FACE RECOGNITION." Acta Electrotechnica et Informatica 19, no. 4 (2020): 15–20. http://dx.doi.org/10.15546/aeei-2019-0025.
Der volle Inhalt der QuelleZhou, Zhenji, Lifa Wu, and Zheng Hong. "Context-Aware Access Control Model for Cloud Computing." International Journal of Grid and Distributed Computing 6, no. 6 (2013): 1–12. http://dx.doi.org/10.14257/ijgdc.2013.6.6.01.
Der volle Inhalt der QuelleKarjoth, Günter. "Access control with IBM Tivoli access manager." ACM Transactions on Information and System Security 6, no. 2 (2003): 232–57. http://dx.doi.org/10.1145/762476.762479.
Der volle Inhalt der QuelleR. Bauer Mengelberg, Juan. "Teaching System Access Control." Issues in Informing Science and Information Technology 2 (2005): 139–58. http://dx.doi.org/10.28945/817.
Der volle Inhalt der QuelleJunquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Der volle Inhalt der QuelleBaláž, Anton, Branislav Madoš, and Michal Ambróz. "Android Access Control Extension." Acta Informatica Pragensia 4, no. 3 (2015): 310–17. http://dx.doi.org/10.18267/j.aip.77.
Der volle Inhalt der QuelleHamby, Sherry. "Coercion, Access, and Control." Criminal Justice Review 43, no. 1 (2018): 5–9. http://dx.doi.org/10.1177/0734016817751581.
Der volle Inhalt der QuelleYe, Shuiming, Ying Luo, Jian Zhao, and Sen-ChingS Cheung. "Anonymous Biometric Access Control." EURASIP Journal on Information Security 2009, no. 1 (2009): 865259. http://dx.doi.org/10.1186/1687-417x-2009-865259.
Der volle Inhalt der QuelleToledo, Rodolfo, Angel Nunez, Eric Tanter, and Jacques Noye. "Aspectizing Java Access Control." IEEE Transactions on Software Engineering 38, no. 1 (2012): 101–17. http://dx.doi.org/10.1109/tse.2011.6.
Der volle Inhalt der QuelleToledo, Rodolfo, and Eric Tanter. "Access Control in JavaScript." IEEE Software 28, no. 5 (2011): 76–84. http://dx.doi.org/10.1109/ms.2010.154.
Der volle Inhalt der QuelleAlhamdani, Wasim A. "Resilent Access Control Model." Journal of Applied Security Research 12, no. 4 (2017): 478–96. http://dx.doi.org/10.1080/19361610.2017.1354273.
Der volle Inhalt der QuelleBarker, Steve, Marek J. Sergot, and Duminda Wijesekera. "Status-Based Access Control." ACM Transactions on Information and System Security 12, no. 1 (2008): 1–47. http://dx.doi.org/10.1145/1410234.1410235.
Der volle Inhalt der QuelleКОРЧИНСЬКИЙ, ВОЛОДИМИР, ІРИНА ТАРАСЕНКО, СЕРГІЙ РАЦИБОРИНСЬКИЙ, ОЛЕКСАНДР АКАЄВ, and АРТЕМ ХАДЖИОГЛО. "AUTOMATED ACCESS CONTROL SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 333, no. 2 (2024): 140–45. http://dx.doi.org/10.31891/2307-5732-2024-333-2-22.
Der volle Inhalt der QuelleStevens, Gunnar, and Volker Wulf. "Computer-supported access control." ACM Transactions on Computer-Human Interaction 16, no. 3 (2009): 1–26. http://dx.doi.org/10.1145/1592440.1592441.
Der volle Inhalt der QuelleStankovski, Stevan, Gordana Ostojic, Nikola Djukic, Srdjan Tegeltija, and Aleksandar Milojkovic. "Bluetooth parking access control." Sensor Review 34, no. 3 (2014): 244–54. http://dx.doi.org/10.1108/sr-06-2012-643.
Der volle Inhalt der QuelleHu, Vincent C., D. Richard Kuhn, and David F. Ferraiolo. "Attribute-Based Access Control." Computer 48, no. 2 (2015): 85–88. http://dx.doi.org/10.1109/mc.2015.33.
Der volle Inhalt der QuelleMoffett, Jonathan D., and Morris S. Sloman. "Content-dependent access control." ACM SIGOPS Operating Systems Review 25, no. 2 (1991): 63–70. http://dx.doi.org/10.1145/122120.122125.
Der volle Inhalt der QuelleHu, Vincent C., and Rick Kuhn. "Access Control Policy Verification." Computer 49, no. 12 (2016): 80–83. http://dx.doi.org/10.1109/mc.2016.368.
Der volle Inhalt der QuelleNicola, Rocco De, GianLuigi Ferrari, Rosario Pugliese, and Betti Venneri. "Types for access control." Theoretical Computer Science 240, no. 1 (2000): 215–54. http://dx.doi.org/10.1016/s0304-3975(99)00232-7.
Der volle Inhalt der QuelleMurray, Bill. "Security and access control." Computer Fraud & Security Bulletin 1992, no. 12 (1992): 10–15. http://dx.doi.org/10.1016/s0142-0496(09)90145-x.
Der volle Inhalt der QuelleParker, T. A. "Network access control developments." Computer Audit Update 1990, no. 6 (1990): 3–10. http://dx.doi.org/10.1016/s0960-2593(05)80056-4.
Der volle Inhalt der QuelleJackson, Keith. "Horatius access control system." Computer Fraud & Security Bulletin 11, no. 6 (1989): 17–19. http://dx.doi.org/10.1016/0142-0496(89)90204-x.
Der volle Inhalt der QuelleGan, Guohua, E. Chen, Zhiyuan Zhou, and Yan Zhu. "Token-Based Access Control." IEEE Access 8 (2020): 54189–99. http://dx.doi.org/10.1109/access.2020.2979746.
Der volle Inhalt der QuelleDomingo-Ferrer, Joseph. "Algorithm- sequenced access control." Computers & Security 10, no. 7 (1991): 639–52. http://dx.doi.org/10.1016/0167-4048(91)90122-t.
Der volle Inhalt der QuelleParker, Tom. "Role based access control." Computers & Security 14, no. 5 (1995): 418. http://dx.doi.org/10.1016/0167-4048(95)97115-q.
Der volle Inhalt der QuelleBhatia, Rekha, and Manpreet Singh Gujral. "Privacy Aware Access Control." International Journal of Information Technologies and Systems Approach 10, no. 2 (2017): 17–30. http://dx.doi.org/10.4018/ijitsa.2017070102.
Der volle Inhalt der QuelleYe, Shuiming, Ying Luo, Jian Zhao, and Sen-Ching S. Cheung. "Anonymous Biometric Access Control." EURASIP Journal on Information Security 2009 (2009): 1–17. http://dx.doi.org/10.1155/2009/865259.
Der volle Inhalt der QuelleКОРЧИНСЬКИЙ, ВОЛОДИМИР, ІРИНА ТАРАСЕНКО, СЕРГІЙ РАЦИБОРИНСЬКИЙ, ОЛЕКСАНДР АКАЄВ, and АРТЕМ ХАДЖИОГЛО. "AUTOMATED ACCESS CONTROL SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 331, no. 1 (2024): 291–96. http://dx.doi.org/10.31891/2307-5732-2024-331-44.
Der volle Inhalt der QuelleDUNDUA, Besik, Khimuri RUKHAIA, Mikheili RUKHAIA та Lali TIBUA. "PρLog for Access Control". Journal of Technical Science and Technologies 5, № 2 (2017): 41–44. http://dx.doi.org/10.31578/jtst.v5i2.108.
Der volle Inhalt der QuelleKim, Jinsu, and Namje Park. "Role Based Access Control based File Access Control Mechanism with Smart Contract." Journal of Korean Institute of Information Technology 17, no. 9 (2019): 113–21. http://dx.doi.org/10.14801/jkiit.2019.17.9.113.
Der volle Inhalt der QuelleBertolino, Antonia, Said Daoudagh, Francesca Lonetti, Eda Marchetti, and Louis Schilders. "Automated testing of eXtensible Access Control Markup Language‐based access control systems." IET Software 7, no. 4 (2013): 203–12. http://dx.doi.org/10.1049/iet-sen.2012.0101.
Der volle Inhalt der QuelleLobo, Jorge. "Relationship-based access control: More than a social network access control model." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 9, no. 2 (2018): e1282. http://dx.doi.org/10.1002/widm.1282.
Der volle Inhalt der QuelleDanilescu, Marcel. "MODELING ACCESS CONTROL AND USER ACTIONS USING TRUST - BASED ACCESS CONTROL POLICIES." Journal of Social Sciences III (3) (September 1, 2020): 72–84. https://doi.org/10.5281/zenodo.3971967.
Der volle Inhalt der QuelleLijun Chen, S. H. Low, and J. C. Doyle. "Random Access Game and Medium Access Control Design." IEEE/ACM Transactions on Networking 18, no. 4 (2010): 1303–16. http://dx.doi.org/10.1109/tnet.2010.2041066.
Der volle Inhalt der QuelleZhu, Nafei, Fangbo Cai, Jingsha He, Yixuan Zhang, Wenxin Li, and Zhao Li. "Management of access privileges for dynamic access control." Cluster Computing 22, S4 (2018): 8899–917. http://dx.doi.org/10.1007/s10586-018-2018-1.
Der volle Inhalt der QuelleLun-wei, Wang, Liao Xiang-ke, and Wang Huai-min. "Access request trustworthiness in weighted access control framework." Wuhan University Journal of Natural Sciences 10, no. 1 (2005): 65–69. http://dx.doi.org/10.1007/bf02828619.
Der volle Inhalt der QuelleDanilescu, Marcel, and Victor Besliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII, no. 2 (2021): 67–78. http://dx.doi.org/10.52326/jes.utm.2021.28(2).05.
Der volle Inhalt der Quelle