Academic literature on the topic 'Access control decisions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Access control decisions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Access control decisions"
Savchyn, M., A. Zavydniak, and V. Olashyn. "Direct Effect of the Constitution of Ukraine in Focus: Access to the Justice and Judicial Control of the Enforcement of Judgment." Uzhhorod National University Herald. Series: Law, no. 70 (June 18, 2022): 146–55. http://dx.doi.org/10.24144/2307-3322.2022.70.21.
Full textHuang, Kun, and Yun Song Jian. "Research on a New Access Control Technology." Advanced Materials Research 765-767 (September 2013): 1858–62. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1858.
Full textBarrilleaux, Charles J., and Mark E. Miller. "Decisions without Consequences: Cost Control and Access in State Medicaid Programs." Journal of Health Politics, Policy and Law 17, no. 1 (1992): 97–118. http://dx.doi.org/10.1215/03616878-17-1-97.
Full textSheikhalishahi, Mina, Ischa Stork, and Nicola Zannone. "Privacy-preserving policy evaluation in multi-party access control." Journal of Computer Security 29, no. 6 (October 27, 2021): 613–50. http://dx.doi.org/10.3233/jcs-200007.
Full textAtlam, Hany F., Muhammad Ajmal Azad, and Nawfal F. Fadhel. "Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model." Sensors 22, no. 5 (March 4, 2022): 2005. http://dx.doi.org/10.3390/s22052005.
Full textYu, Hui, and Dongyan Chen. "New Optimal Control Decisions for Channel System With Lagged Effect: Dynamic Advertising and Pricing Cases." IEEE Access 7 (2019): 75350–59. http://dx.doi.org/10.1109/access.2019.2918347.
Full textLaitrakun, Seksan. "Decision fusion for composite hypothesis testing in wireless sensor networks over a shared and noisy collision channel." International Journal of Distributed Sensor Networks 16, no. 7 (July 2020): 155014772094020. http://dx.doi.org/10.1177/1550147720940204.
Full textMIAO, Siwei, Xiaojuan ZHANG, and Zhe LIU. "Fine-Grained Access Control Mechanism of Energy Internet." Wuhan University Journal of Natural Sciences 27, no. 3 (June 2022): 231–39. http://dx.doi.org/10.1051/wujns/2022273231.
Full textArudkar, Archna, and Vimla Jethani. "RBAC+: Protecting Web Databases With Access Control Mechanism." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 2, no. 1 (November 27, 2012): 24–30. http://dx.doi.org/10.24297/ijmit.v2i1.1407.
Full textEt. al., Kriti Srivastava,. "NdRAdAC: Need based Access Control Framework for an Emergency Response System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1414–28. http://dx.doi.org/10.17762/turcomat.v12i5.2037.
Full textDissertations / Theses on the topic "Access control decisions"
Misra, Gaurav. "Recommending access control decisions to social media users." Thesis, Lancaster University, 2017. http://eprints.lancs.ac.uk/88134/.
Full textChuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.
Full textMagnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.
Full textRole based access control (RBAC) is widely used in health care systems today. Some of the biggest systems in use at Norwegian hospitals utilizes role based integration. The basic concept of RBAC is that users are assigned to roles, permissions are assigned to roles and users acquire permissions by being members of roles. An alternative approach to the role based access distribution, is that information should be available only to those who are taking active part in a patients treatment. This approach is called decision based access control (DBAC). While some RBAC implementations grant access to a groups of people by ward, DBAC ensures that access to relevant parts of the patients medical record is given for treatment purposes regardless of which department the health care worker belongs to. Until now the granularity which the legal framework describes has been difficult to follow. The practical approach has been to grant access to entire wards or organizational units in which the patient currently resides. Due to the protection of personal privacy, it is not acceptable that any medical record is available to every clinician at all times. The most important reason to implement DBAC where RBAC exists today, is to get an access control model that is more dynamic. The users should have the access they need to perform their job at all times, but not more access than needed. With RBAC, practice has shown that it is very hard to make dynamic access rules when properties such as time and tasks of an employees work change. This study reveals that pretty much all security measures in the RBAC systems can be overridden by the use of emergency access features. These features are used extensively in everyday work at the hospitals, and thereby creates a security risk. At the same time conformance with the legal framework is not maintained. Two scenarios are simulated in a fictional RBAC and DBAC environment in this report. The results of the simulation show that a complete audit of the logs containing access right enhancements in the RBAC environment is unfeasible at a large hospital, and even checking a few percent of the entries is also a very large job. Changing from RBAC to DBAC would probably affect this situation to the better. Some economical advantages are also pointed out. If a change is made, a considerable amount of time that is used by health care workers to unblock access to information they need in their everyday work will be saved.
Giannakopoulos, Theophilos John. "Multi-Decision Policy and Policy Combinator Specifications." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-theses/166.
Full textMetin, Mehmet Ozer. "Creating Application Security Layer Based On Resource Access Decision Service." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/12608827/index.pdf.
Full textenterprise-level"
and "
application-level"
security aspects in one layer could give great benefits such as reusability, manageability, and scalability. In this thesis, adding a new layer to n-tier web application architectures to provide a common evaluation and enforcement environment for both enterprise-level and application level policies to bring together access controlling with application-level security. Removing discrimination between enterprise-level and application-level security policies improves manageability, reusability and scalability of whole system. Resource Access Decision (RAD) specification has been implemented and used as authentication mechanism for this layer. RAD service not only provides encapsulating domain specific factors to give access decisions but also can form a solid base to apply positive and negative security model to secure enterprise web applications. Proposed solution has been used in a real life system and test results have been presented.
Pacheco, Páramo Diego Felipe. "Performance analysis of access control and resource management methods in heterogeneous networks." Doctoral thesis, Editorial Universitat Politècnica de València, 2014. http://hdl.handle.net/10251/34782.
Full textPerformance requirements on mobile networks are tighter than ever as a result of the adoption of mobile devices such as smartphones or tablets, and the QoS levels that mobile applications demand for their correct operation. The data traffic volume carried in mobile networks for 2012 is the same as the total internet traffic in 2000, and this exponential growth tendency will continue in years to come. In order to fulfill users¿ expectations, it is imperative for mobile networks to make the best use of the available resources. Heterogeneous networks (Hetnets) have the ability to integrate several technologies in a coherent and efficient manner in order to enhance users¿ experience. The first challenge of heterogeneous networks is to integrate several radio access technologies, which exist as a result of simultaneous technology developments and a paced replacement of legacy technology. A joint management of several RAT¿s enhances network¿s efficiency, and this influences user¿s experience. Another challenge of heterogeneous networks is the improvement of current macrocells through an efficient use of the electromagnetic spectrum. Some approaches aim to optimize the antennas or use higher-order modulation techniques, but a more disruptive approach is the use of dynamic spectrum techniques through a technology known as cognitive radio. Finally, heterogeneous networks should be able to integrate several layers. In addition to the well studied micro and pico cells, a new generation of cheaper and easily configurable small cell networks have been proposed. However, its success is attached to its ability to adapt to the current context of mobile networks.
Pacheco Páramo, DF. (2013). Performance analysis of access control and resource management methods in heterogeneous networks [Tesis doctoral]. Editorial Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/34782
Alfresco
Abdallah, AbouSheaisha Abdallah Sabry. "Cross-layer Control for Adaptive Video Streaming over Wireless Access Networks." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/78844.
Full textPh. D.
Cowley, Stephen. "OH&S in small business : influencing the decision makers : the application of a social marketing model to increase the uptake of OHS risk control." University of Ballarat, 2006. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/14590.
Full textDoctor of Philosphy
Ngo, Minh Hanh. "Cross-layer adaptive transmission scheduling in wireless networks." Thesis, University of British Columbia, 2007. http://hdl.handle.net/2429/432.
Full textFriend, Daniel. "Cognitive Networks: Foundations to Applications." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/26449.
Full textPh. D.
Books on the topic "Access control decisions"
Mollmann, Marianne. Decisions denied: Women's access to contraceptives and abortion in Argentina. [New York: Human Rights Watch, 2005.
Find full textKumar, Niraj. Bharat's treatise on Right to Information Act, 2005: Containing a detailed commentary on the statutory provisions, practices world over, state rules, international conventions & declarations, Supreme Court, high courts, CIC and international decisions, it also provides sample questions and specimen forms. New Delhi: Bharat Law House, 2014.
Find full textOffice, General Accounting. Information requests: Department of Justice's response to requests for court tax decisions : fact sheet for the chairman, Subcommittee on Government Information, Justice, and Agriculture, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1989.
Find full textRight to repair: Industry decisions and legislative options : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, November 10, 2005. Washington: U.S. G.P.O., 2005.
Find full textHalpin, Stanley M. The Army Command and Control Evaluation System (ACCES). Alexandria, Va: U.S. Army Research Institute for the Behavioral and Social Sciences, 1996.
Find full textGallardo, Perla Gómez. El IFAI y la calidad jurídica de sus decisiones. México, D.F: Libertad de Información-México, 2007.
Find full textFineberg, Richard A. The 1985 TAPS settlement: A case study in the effects of confidentiality on information available to decision makers in oil and gas revenue disputes, supplemental report. [Alaska: The Legislature, 1990.
Find full textEuropean Court of Human Rights. Affaire Gaskin: 1. Décision du 23 février 1989 (dessaisissement) : 2. Arrêt du 7 juillet 1989 = : Gaskin case : 1. Decision of 23 February 1989 (relinquishment of jurisdiction) : 2. Judgment of 7 July 1989. Strasbourg: Registry of the Court, Council of Europe, 1989.
Find full textRoger, Herdman, and Institute of Medicine (U.S.). Division of Health Care Services., eds. Non-heart-beating organ transplantation: Medical and ethical issues in procurement. Washington, D.C: National Academy Press, 1997.
Find full textSundstrom, Beth L., and Cara Delay. Birth Control. Oxford University Press, 2020. http://dx.doi.org/10.1093/wentk/9780190069674.001.0001.
Full textBook chapters on the topic "Access control decisions"
Aura, Tuomas. "Fast access control decisions from delegation certificate databases." In Information Security and Privacy, 284–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0053741.
Full textVillar, Feliciano, Rodrigo Serrat, Annette Bilfeldt, and Joe Larragy. "Older People in Long-Term Care Institutions: A Case of Multidimensional Social Exclusion." In International Perspectives on Aging, 297–309. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-51406-8_23.
Full textPretzsch, Sebastian, Holger Drees, and Lutz Rittershaus. "Mobility Data Space." In Designing Data Spaces, 343–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_21.
Full textGarg, Sakshi, Deepti Mehrotra, and Shalini Bhartiya. "Dynamic Access Control Solution for Cross-Tenancy in a Cloud Environment." In Studies in Systems, Decision and Control, 111–29. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4996-4_7.
Full textArdagna, Claudio Agostino, Sabrina De Capitani di Vimercati, Eros Pedrini, and Pierangela Samarati. "Privacy-Aware Access Control System: Evaluation and Decision." In Digital Privacy, 377–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19050-6_14.
Full textEnache, Rodica Gabriela, Mariana Floricica Călin, and Enache Tușa. "Necessities and Expectations in Regard to Dobrudja’s Rural Youth Access to Higher Education." In Studies in Systems, Decision and Control, 135–53. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30659-5_8.
Full textKimbahune, Vinod V., Parikshit N. Mahalle, Shafi K. Pathan, and Shaik Naser. "Distributed Access Control Scheme for Machine-to-Machine Communication in IoT Using Trust Factor." In Studies in Systems, Decision and Control, 131–44. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4996-4_8.
Full textKayes, A. S. M., Wenny Rahayu, Tharam Dillon, Syed Mahbub, Eric Pardede, and Elizabeth Chang. "Dynamic Transitions of States for Context-Sensitive Access Control Decision." In Web Information Systems Engineering – WISE 2018, 127–42. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02922-7_9.
Full textArdagna, Claudio A., Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, and Pierangela Samarati. "The Architecture of a Privacy-Aware Access Control Decision Component." In Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, 1–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11741060_1.
Full textYou, Mingshan, Jiao Yin, Hua Wang, Jinli Cao, and Yuan Miao. "A Minority Class Boosted Framework for Adaptive Access Control Decision-Making." In Web Information Systems Engineering – WISE 2021, 143–57. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90888-1_12.
Full textConference papers on the topic "Access control decisions"
Morisset, Charles, and Nicola Zannone. "Reduction of access control decisions." In the 19th ACM symposium. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2613087.2613106.
Full textLachmund, Sven, Thomas Walter, Laurent Gomez, Laurent Bussard, and Eddy Olk. "Context-Aware Access Control; Making Access Control Decisions Based on Context Information." In 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340450.
Full textLachmund, Sven, Thomas Walter, Laurent Gomez, Laurent Bussard, and Eddy Olk. "Context-Aware Access Control Making Access Control Decisions Based on Context Information." In 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems. IEEE, 2006. http://dx.doi.org/10.1109/mobiqw.2006.361782.
Full textNi, Qun, Elisa Bertino, and Jorge Lobo. "D-algebra for composing access control policy decisions." In the 4th International Symposium. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1533057.1533097.
Full textMateeva, Zhivka. "JUDICIAL CONTROL OF DECISIONS AND REFUSALS TO GRANT ACCESS TO PUBLIC INFORMATION." In 15 YEARS OF ADMINISTRATIVE JUSTICE IN BULGARIA - PROBLEMS AND PERSPECTIVES. University publishing house "Science and Economics", University of Economics - Varna, 2022. http://dx.doi.org/10.36997/ppdd2022.140.
Full textGupta, Aditi, Markus Miettinen, and N. Asokan. "Using context-profiling to aid access control decisions in mobile devices." In 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 2011. http://dx.doi.org/10.1109/percomw.2011.5766891.
Full textAl Lail, Mustafa. "Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control Decisions." In SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3450569.3464395.
Full textMisra, Gaurav, Jose M. Such, and Hamed Balogun. "Non-sharing communities? An empirical study of community detection for access control decisions." In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 2016. http://dx.doi.org/10.1109/asonam.2016.7752212.
Full textHarbach, Marian, Sascha Fahl, Michael Brenner, Thomas Muders, and Matthew Smith. "Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions." In 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2012. http://dx.doi.org/10.1109/pst.2012.6297915.
Full textDa Silva, Carlos Eduardo, Welkson De Medeiros, and Silvio Sampaio. "PEP4Django A Policy Enforcement Point for Python Web Applications." In IX Workshop de Gestão de Identidades Digitais. Sociedade Brasileira da Computação, 2019. http://dx.doi.org/10.5753/wgid.2019.14021.
Full textReports on the topic "Access control decisions"
Dopfer, Jaqui. Öffentlichkeitsbeteiligung bei diskursiven Konfliktlösungsverfahren auf regionaler Ebene. Potentielle Ansätze zur Nutzung von Risikokommunikation im Rahmen von e-Government. Sonderforschungsgruppe Institutionenanalyse, 2003. http://dx.doi.org/10.46850/sofia.3933795605.
Full textWong, Xaria, and Iulia Andreea Toma. Gender and Protection Analysis: Juba, Rumbek and Pibor, South Sudan. Oxfam, May 2022. http://dx.doi.org/10.21201/2022.8946.
Full textZambrano, Omar, Hugo Hernández, Ricardo Benzecry, and José Gregorio Gómez. Efectos locales de los booms petroleros sobre la acumulación de capital humano: el caso de “la apertura petrolera” de Venezuela en los años noventa. Banco Interamericano de Desarrollo, November 2022. http://dx.doi.org/10.18235/0004526.
Full textBourrier, Mathilde, Michael Deml, and Farnaz Mahdavian. Comparative report of the COVID-19 Pandemic Responses in Norway, Sweden, Germany, Switzerland and the United Kingdom. University of Stavanger, November 2022. http://dx.doi.org/10.31265/usps.254.
Full text