Journal articles on the topic 'Access control decisions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Access control decisions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Savchyn, M., A. Zavydniak, and V. Olashyn. "Direct Effect of the Constitution of Ukraine in Focus: Access to the Justice and Judicial Control of the Enforcement of Judgment." Uzhhorod National University Herald. Series: Law, no. 70 (June 18, 2022): 146–55. http://dx.doi.org/10.24144/2307-3322.2022.70.21.
Full textHuang, Kun, and Yun Song Jian. "Research on a New Access Control Technology." Advanced Materials Research 765-767 (September 2013): 1858–62. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1858.
Full textBarrilleaux, Charles J., and Mark E. Miller. "Decisions without Consequences: Cost Control and Access in State Medicaid Programs." Journal of Health Politics, Policy and Law 17, no. 1 (1992): 97–118. http://dx.doi.org/10.1215/03616878-17-1-97.
Full textSheikhalishahi, Mina, Ischa Stork, and Nicola Zannone. "Privacy-preserving policy evaluation in multi-party access control." Journal of Computer Security 29, no. 6 (October 27, 2021): 613–50. http://dx.doi.org/10.3233/jcs-200007.
Full textAtlam, Hany F., Muhammad Ajmal Azad, and Nawfal F. Fadhel. "Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model." Sensors 22, no. 5 (March 4, 2022): 2005. http://dx.doi.org/10.3390/s22052005.
Full textYu, Hui, and Dongyan Chen. "New Optimal Control Decisions for Channel System With Lagged Effect: Dynamic Advertising and Pricing Cases." IEEE Access 7 (2019): 75350–59. http://dx.doi.org/10.1109/access.2019.2918347.
Full textLaitrakun, Seksan. "Decision fusion for composite hypothesis testing in wireless sensor networks over a shared and noisy collision channel." International Journal of Distributed Sensor Networks 16, no. 7 (July 2020): 155014772094020. http://dx.doi.org/10.1177/1550147720940204.
Full textMIAO, Siwei, Xiaojuan ZHANG, and Zhe LIU. "Fine-Grained Access Control Mechanism of Energy Internet." Wuhan University Journal of Natural Sciences 27, no. 3 (June 2022): 231–39. http://dx.doi.org/10.1051/wujns/2022273231.
Full textArudkar, Archna, and Vimla Jethani. "RBAC+: Protecting Web Databases With Access Control Mechanism." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 2, no. 1 (November 27, 2012): 24–30. http://dx.doi.org/10.24297/ijmit.v2i1.1407.
Full textEt. al., Kriti Srivastava,. "NdRAdAC: Need based Access Control Framework for an Emergency Response System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1414–28. http://dx.doi.org/10.17762/turcomat.v12i5.2037.
Full textXu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.
Full textSadeghi, Mersedeh, Luca Sartor, and Matteo Rossi. "A semantic-based access control approach for systems of systems." ACM SIGAPP Applied Computing Review 21, no. 4 (December 2021): 5–19. http://dx.doi.org/10.1145/3512753.3512754.
Full textDemurjian, Steven A., Eugene Sanzi, Thomas P. Agresta, and William A. Yasnoff. "Multi-Level Security in Healthcare Using a Lattice-Based Access Control Model." International Journal of Privacy and Health Information Management 7, no. 1 (January 2019): 80–102. http://dx.doi.org/10.4018/ijphim.2019010105.
Full textBoluma Mangata, Bopatriciat, Dominique Ilunga N’kashama, Parfum Bukanga Christian, and Donatien Kadima Muamba. "COMPARATIVE STUDIES BETWEEN A FACIAL RECOGNITION SYSTEM AND A FINGERPRINT RECOGNITION SYSTEM FOR ACCESS CONTROL." IJISCS (International Journal of Information System and Computer Science) 6, no. 2 (August 31, 2022): 69. http://dx.doi.org/10.56327/ijiscs.v6i2.1237.
Full textZhao, Bin, Guiyue Zheng, Yilong Gao, and Yanchen Zhao. "Access-Control Model of Super Business System Based on Business Entity." Electronics 11, no. 19 (September 27, 2022): 3073. http://dx.doi.org/10.3390/electronics11193073.
Full textArgall, Brenna D. "Autonomy in Rehabilitation Robotics: An Intersection." Annual Review of Control, Robotics, and Autonomous Systems 1, no. 1 (May 28, 2018): 441–63. http://dx.doi.org/10.1146/annurev-control-061417-041727.
Full textShen, Hai Bo, and Yu Cheng. "A Semantic-Aware Context-Based Access Control Framework for Mobile Web Services." Applied Mechanics and Materials 195-196 (August 2012): 498–503. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.498.
Full textChoi, Donghee, Dohoon Kim, and Seog Park. "A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems." Computational and Mathematical Methods in Medicine 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/265132.
Full textEzeoha, Abel Ebeh, Ebele Ogamba, and Ndi Okereke Onyiuke. "Corporate nationality, foreign control and capital structure decisions in Nigeria." Corporate Ownership and Control 6, no. 1-3 (2008): 371–81. http://dx.doi.org/10.22495/cocv6i1c3p4.
Full textNamane, Sarra, Nassira Ghoualmi, and Mustafa Kaiiali. "Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making." International Journal of Information Security and Privacy 15, no. 1 (January 2021): 99–116. http://dx.doi.org/10.4018/ijisp.2021010105.
Full textHan, Jiujiang, Yuxiang Zhang, Jian Liu, Ziyuan Li, Ming Xian, Huimei Wang, Feilong Mao, and Yu Chen. "A Blockchain-Based and SGX-Enabled Access Control Framework for IoT." Electronics 11, no. 17 (August 29, 2022): 2710. http://dx.doi.org/10.3390/electronics11172710.
Full textPatil, Mallanagouda, and Rajashekhar C. Biradar. "Media Access Control in Wireless Sensor Networks using Priority Index." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 2 (February 1, 2017): 416. http://dx.doi.org/10.11591/ijeecs.v5.i2.pp416-426.
Full textCastagnoli, Steven P. "Internet-based Decision Tools for Orchard Pest Management—Adoption in the Hood River Valley of Oregon." HortTechnology 16, no. 1 (January 2006): 133–38. http://dx.doi.org/10.21273/horttech.16.1.0133.
Full textCrick, James M., and Dave Crick. "Angel investors’ predictive and control funding criteria." Journal of Research in Marketing and Entrepreneurship 20, no. 1 (July 9, 2018): 34–56. http://dx.doi.org/10.1108/jrme-11-2016-0043.
Full textJames, Sarah, Maree Toombs, and Wendy Brodribb. "Barriers and enablers to postpartum contraception among Aboriginal Australian women: factors influencing contraceptive decisions." Australian Journal of Primary Health 24, no. 3 (2018): 241. http://dx.doi.org/10.1071/py17041.
Full textSousa, Rosilene Paiva Marinho de, Marckson Roberto Ferreira de Sousa, and Guilherme Ataíde Dias. "Entre o acesso aberto e a proteção autoral: os limites autorais nas decisões judiciais." Páginas a&b : Arquivos & Bibliotecas, esp. (2020): 137–41. http://dx.doi.org/10.21747/21836671/pagnesppk15.
Full textMa, Yao, Hong Wei Lu, and Yi Zhu Zhao. "Building a Risk-Aware Adaptive Trust Negotiation Framework." Advanced Materials Research 171-172 (December 2010): 7–10. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.7.
Full textLi, Qing, Peter Magati, Raphael Lencucha, Ronald Labonte, Donald Makoka, and Jeffrey Drope. "The Economic Geography of Kenyan Tobacco Farmers’ Livelihood Decisions." Nicotine & Tobacco Research 21, no. 12 (January 25, 2019): 1711–14. http://dx.doi.org/10.1093/ntr/ntz011.
Full textKnight, Jonathan D., and John D. Mumford. "Decision Support Systems in Crop Protection." Outlook on Agriculture 23, no. 4 (December 1994): 281–85. http://dx.doi.org/10.1177/003072709402300408.
Full textKuczyński, Tadeusz. "SHAPING THE SYSTEM OF JUDICIAL CONTROL OF DISCIPLINARY DECISIONS IN SERVICE RELATIONSHIPS." Roczniki Administracji i Prawa specjalny, no. XXI (December 30, 2021): 599–609. http://dx.doi.org/10.5604/01.3001.0015.6200.
Full textde Carolis, Daniele. "Jurisdiction of the Italian Tax Judge on Administrative Acts Denying Access to the Arbitration Convention on Transfer Pricing: Towards a Dispute Resolution Procedure Ever More Independent of State Con." Intertax 44, Issue 2 (February 1, 2016): 180–84. http://dx.doi.org/10.54648/taxi2016012.
Full textRomaniuk, Oleksandr, Pavlo Skladannyi, and Svitlana Shevchenko. "COMPARATIVE ANALYSIS OF SOLUTIONS TO PROVIDE CONTROL AND MANAGEMENT OF PRIVILEGED ACCESS IN THE IT ENVIRONMENT." Cybersecurity: Education, Science, Technique 16, no. 4 (2022): 98–112. http://dx.doi.org/10.28925/2663-4023.2022.16.98112.
Full textChurubrova, S. M. "Information security policy in the systems of information and analytical maintenance for support of organizational decisions." PROBLEMS IN PROGRAMMING, no. 4 (December 2016): 097–103. http://dx.doi.org/10.15407/pp2016.04.097.
Full textJagadish, H. V., Julia Stoyanovich, and Bill Howe. "COVID-19 Brings Data Equity Challenges to the Fore." Digital Government: Research and Practice 2, no. 2 (March 2021): 1–7. http://dx.doi.org/10.1145/3440889.
Full textMaslennikova, L. N. "TRANSFORMATION OF PRE-TRIAL PROCEEDINGS IN THE INITIAL STAGE OF CRIMINAL PROCEEDINGS, ENSURING ACCESS TO JUSTICE IN THE INDUSTRY 4.0 ERA." Actual Problems of Russian Law, no. 6 (July 18, 2019): 137–46. http://dx.doi.org/10.17803/1994-1471.2019.103.6.137-146.
Full textKaczmarczyk, Martyna. "CONTROLLING ACCESS TO WEAPONS IN A SYSTEMIC ASPECT." PRZEGLĄD POLICYJNY 135, no. 3 (September 2, 2019): 195–206. http://dx.doi.org/10.5604/01.3001.0013.7544.
Full textRoba, Rufo, and Reuben Wambua Kikwatha. "Influence of Women Participation on Sustainability of the Community Conservation Project Implemented by Jaldesa Community Conservancy in Marsabit County, Kenya." European Journal of Business and Management Research 6, no. 3 (June 19, 2021): 188–94. http://dx.doi.org/10.24018/ejbmr.2021.6.3.898.
Full textXie, Pengshou, Haoxuan Yang, Liangxuan Wang, Shuai Wang, Tao Feng, and Yan Yan. "Service-Based Hybrid Access Control Technology with Priority Level for the Internet of Vehicles under the Cloud Architecture." Security and Communication Networks 2021 (December 3, 2021): 1–18. http://dx.doi.org/10.1155/2021/4646087.
Full textBitoun, Ariane, Hans ten Bergen, and Yann Prudent. "Smart Simulation for Decision Support at Headquarters." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 3 (June 1, 2019): 81–90. http://dx.doi.org/10.2478/kbo-2019-0122.
Full textTomaiuolo, Michele. "Trust Enforcing and Trust Building, Different Technologies and Visions." International Journal of Cyber Warfare and Terrorism 2, no. 4 (October 2012): 49–66. http://dx.doi.org/10.4018/ijcwt.2012100104.
Full textKim, Andrew H., Afaf Girgis, Neda Karimi, Alexandra J. Sechi, Joseph Descallar, Jane M. Andrews, Corey A. Siegel, and Susan J. Connor. "A Web-Based Decision Aid (myAID) to Enhance Quality of Life, Empowerment, Decision Making, and Disease Control for Patients With Ulcerative Colitis: Protocol for a Cluster Randomized Controlled Trial." JMIR Research Protocols 9, no. 7 (July 10, 2020): e15994. http://dx.doi.org/10.2196/15994.
Full textArmando, Alessandro, Michele Bezzi, Nadia Metoui, and Antonino Sabetta. "Risk-Based Privacy-Aware Information Disclosure." International Journal of Secure Software Engineering 6, no. 2 (April 2015): 70–89. http://dx.doi.org/10.4018/ijsse.2015040104.
Full textJohansyah, Johansyah. "PUTUSAN MAHKAMAH KONSTITUSI BERSIFAT FINAL DAN MENGIKAT (BINDING)." Solusi 19, no. 2 (May 1, 2021): 165–82. http://dx.doi.org/10.36546/solusi.v19i2.359.
Full textHe, Xiaoshuang, Hechuan Guo, and Xueyu Cheng. "Blockchain-Based Privacy Protection Scheme for IoT-Assisted Educational Big Data Management." Wireless Communications and Mobile Computing 2021 (August 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/3558972.
Full textElAshry, Abdelrahman F., Mohamed M. Ramadan, Ziad A. ElAlaily, Mahmoud M. Zaied, Catherine M. Elias, Omar M. Shehata, and Elsayed I. Morgan. "Development of a hybrid multi-layer control architecture for a cooperative team of N − homogeneous robots." Transactions of the Institute of Measurement and Control 42, no. 3 (September 27, 2019): 404–21. http://dx.doi.org/10.1177/0142331219872862.
Full textBoluma Mangata, Bopatriciat, Dominique Ilunga Nakashama, Donatien Kadima Muamba, and Parfum Bukanga Christian. "Implementation of an access control system based on bimodal biometrics with fusion of global decisions: Application to facial recognition and fingerprints." Journal of Computing Research and Innovation 7, no. 2 (October 4, 2022): 43–53. http://dx.doi.org/10.24191/jcrinn.v7i2.289.
Full textSuleiman, Dima, Malek Al-Zewairi, and Adnan Shaout Shaout. "Enhanced Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System." International Journal of Online and Biomedical Engineering (iJOE) 18, no. 04 (March 22, 2022): 31–51. http://dx.doi.org/10.3991/ijoe.v18i04.27485.
Full textMelnychenko, Andriy. "Restrictions of individual’s rights, freedoms and legal interests within temporary access to items and documents: practical aspects." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 3, no. 3 (September 30, 2021): 277–84. http://dx.doi.org/10.31733/2078-3566-2021-3-277-284.
Full textHsiao, Chiu-Han, Yean-Fu Wen, Frank Yeong-Sung Lin, Yu-Fang Chen, Yennun Huang, Yang-Che Su, and Ya-Syuan Wu. "An Optimization-Based Orchestrator for Resource Access and Operation Management in Sliced 5G Core Networks." Sensors 22, no. 1 (December 24, 2021): 100. http://dx.doi.org/10.3390/s22010100.
Full textZúquete, André, Hélder Gomes, João Amaral, and Carlos Oliveira. "Security-Oriented Architecture for Managing IoT Deployments." Symmetry 11, no. 10 (October 19, 2019): 1315. http://dx.doi.org/10.3390/sym11101315.
Full text