Academic literature on the topic 'Access control methods (ACM)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Access control methods (ACM).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Access control methods (ACM)"

1

Asthana, Abhishek, and Padma Lochan Pradhan. "Proposed Abelian ACM Method Optimizing." International Journal of Security and Privacy in Pervasive Computing 13, no. 4 (2021): 33–52. http://dx.doi.org/10.4018/ijsppc.2021100103.

Full text
Abstract:
This proposed UFS ACM is the best preventive control around the world for heterogeneous applications on multiple hardware and software. The subject and object can be able to map, integrate, synchronize, and communicate through reading, writing, and executing over a UFS on the complex web infrastructure. We have to investigate the basic concepts behind access control design and enforcement and point out different security requirements that may need to be taken into consideration as per business, resources, and technology available to us. This paper has to formulate and implement several access
APA, Harvard, Vancouver, ISO, and other styles
2

Kryzhanovskii, S. A., I. B. Tsorin, E. O. Ionova, S. A. Simonenko, and M. B. Vititnova. "Blood microcirculation under conditions of a translational model of alcohol cardiomyopathy in rats." Pharmacokinetics and Pharmacodynamics, no. 2 (August 8, 2024): 43–49. http://dx.doi.org/10.37489/2587-7836-2024-2-43-49.

Full text
Abstract:
Purpose of the study. Studying the blood microcirculation characteristics in the brain and heart of rats with ACM.Materials and methods. The study was carried out on white outbred male rats. The animals were randomized into 2 groups: 1st (n = 7) — control (intact) rats that received a normal diet and free access to water; 2nd (n = 6) — animals that received a normal diet and a 10 % ethanol solution as the only source of liquid. After 24 weeks of alcoholization in animals, the size and inotropic function of the heart were assessed using echocardiography. The next day, in anesthetized rats (uret
APA, Harvard, Vancouver, ISO, and other styles
3

Leyva-Mayorga, Israel, Miguel Rodriguez-Hernandez, Vicent Pla, and Jorge Martinez-Bauset. "Filtering Methods for Efficient Dynamic Access Control in 5G Massive Machine-Type Communication Scenarios." Electronics 8, no. 1 (2018): 27. http://dx.doi.org/10.3390/electronics8010027.

Full text
Abstract:
One of the three main use cases of the fifth generation of mobile networks (5G) is massive machine-type communications (mMTC). The latter refers to the highly synchronized accesses to the cellular base stations from a great number of wireless devices, as a product of the automated exchange of small amounts of data. Clearly, an efficient mMTC is required to support the Internet-of-Things (IoT). Nevertheless, the method to change from idle to connected mode, known as the random access procedure (RAP), of 4G has been directly inherited by 5G, at least, until the first phase of standardization. Re
APA, Harvard, Vancouver, ISO, and other styles
4

Kaur, Amardeep, and Amandeep Verma. "Adaptive Access Control Mechanism (AACM) for Enterprise Cloud Computing." Journal of Electrical and Computer Engineering 2023 (July 13, 2023): 1–30. http://dx.doi.org/10.1155/2023/3922393.

Full text
Abstract:
Enterprise cloud computing provides various services to enterprises, but access to these services is controlled by a firewall. The firewall determines the actions and operations a legitimate user can perform on the available resources. Access control policies allow or restrict access to resources, and they also keep a record of attempted access. In the role-based access control model, access to resources is based on a user’s role in the enterprise. As resources are limited, the policy manager has to create policies that optimize resource availability to different roles to improve overall resou
APA, Harvard, Vancouver, ISO, and other styles
5

Glennie, Miriam, Karen Gardner, Michelle Dowden, and Bart J. Currie. "Active case detection methods for crusted scabies and leprosy: A systematic review." PLOS Neglected Tropical Diseases 15, no. 7 (2021): e0009577. http://dx.doi.org/10.1371/journal.pntd.0009577.

Full text
Abstract:
Background Crusted scabies is endemic in some remote Aboriginal communities in the Northern Territory (NT) of Australia and carries a high mortality risk. Improvement in active case detection (ACD) for crusted scabies is hampered by a lack of evidence about best practice. We therefore conducted a systematic review of ACD methods for leprosy, a condition with similar ACD requirements, to consider how findings could be informative to crusted scabies detection. Methods and principle findings We conducted systematic searches in MEDLINE, CINAHL, Scopus and the Cochrane Database for Systematic Revie
APA, Harvard, Vancouver, ISO, and other styles
6

Wijaya, Cahyo Candra, and Ade Surya Budiman. "Perancangan Keamanan Jaringan Komputer Pada Router Dengan Metode ACL Pada PT. Aruna Sinar Jaya Jakarta." JOURNAL ZETROEM 5, no. 2 (2023): 180–86. http://dx.doi.org/10.36526/ztr.v5i2.3077.

Full text
Abstract:
At PT. Aruna Sinar Jaya, the Internet network plays an important role in running the company's wheel. The problem is that some client computers that do not require an internet connection in their work still have access to the Internet, sometimes the Internet is overused that is not related to work. To solve the above problems, network security methods such as Access Control List (ACL) are needed to make Internet use in Aruna Sinar Jaya more controlled and efficient. In this case, the author recommends implementing ACL on Mikrotik routers using Winbox to restrict internet connections.
 Key
APA, Harvard, Vancouver, ISO, and other styles
7

Kryzhanovskii, S. A., I. B. Tsorin, E. O. Ionova, et al. "Study of the relationship between the severity of alcoholic cardiomyopathy and the level of alcohol consumption in male and female rats in the model of “home drinking”." Pharmacokinetics and Pharmacodynamics, no. 3 (November 3, 2023): 82–93. http://dx.doi.org/10.37489/2587-7836-2023-3-82-93.

Full text
Abstract:
Background. Earlier, on the translational model of alcoholic cardiomyopathy (ACMP) developed by us in outbred white rats, which reproduces the main clinical diagnostic signs of this disease, it was shown that in rats of both sexes under conditions of constant 24/7 alcoholization for 24 weeks, AСMP is formed.This study purpose is a comparative assessment of the features of the ACM formation in male and female rats depending on the level of ethanol consumption in model experiments simulating "domestic drunkenness" with periodic alcoholization 24/2 for 24 weeks.Materials and methods. Experiments
APA, Harvard, Vancouver, ISO, and other styles
8

İSLAM, Mahmud, and Kenan Evren ÖZTOP. "Predialysis education program and early vascular access: a single center experience." Anatolian Current Medical Journal 5, no. 4 (2023): 355–59. http://dx.doi.org/10.38053/acmj.1331260.

Full text
Abstract:
Aims: The main objective of this study is to investigate the impact of a pre-dialysis education program on the selection of vascular access during the initiation of maintenance hemodialysis therapy and the short-term impact of this education on patient outcomes.
 Methods: The data were collected from two different times in the past from patients under maintenance hemodialysis: the first group consisted of a group of patients who received a predialysis education program (intervention group) from a dedicated nephrologist, and the second group included those who did not undergo a control pro
APA, Harvard, Vancouver, ISO, and other styles
9

Sweetenham, John W., Basit Iqbal Chaudhry, Benjamin Teng, Andrew Yue, and Nora Connor. "The use of quasi-experimental design methods to evaluate and improve the impact of acute care centers on oncologic emergencies." Journal of Clinical Oncology 39, no. 15_suppl (2021): e13515-e13515. http://dx.doi.org/10.1200/jco.2021.39.15_suppl.e13515.

Full text
Abstract:
e13515 Background: Reducing avoidable hospital and emergency department (ED) use are national priorities in cancer care. Acute care centers (ACCs) that expand access for patients with oncologic emergencies are increasingly implemented as alternatives to inpatient and ED care. The impact of these ACCs is uncertain. Additionally, how to rigorously evaluate these interventions and to iteratively improve their effectiveness remains unclear as infrastructure interventions such as ACCs are not amenable to experimental manipulation. Methods: We are developing a novel quasi-experimental framework for
APA, Harvard, Vancouver, ISO, and other styles
10

Saroh. "A Scoping Review: Unveiling the Benefits of ACF on Tuberculosis Control." Jurnal Promkes 12, no. 2 (2024): 272–80. http://dx.doi.org/10.20473/jpk.v12.i2.2024.272-280.

Full text
Abstract:
Background: Tuberculosis (TB) ranks among the top ten infectious diseases and causes of death worldwide. The implementation of active case-finding TV is crucial in achieving the objectives of the World Health Organization’s End TB strategy. Aims: This review aims to determine the role of active case finding in TB control in a community with high-burden TB. Methods: This review used databases Pubmed, Research Gate, Ebscohost, Science Direct, and Scopus. The search for articles used the main keywords community, active case finding, AND tuberculosis. The articles were selected in English, with a
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Access control methods (ACM)"

1

Fransson, Linda, and Therese Jeansson. "Biometric methods and mobile access control." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5023.

Full text
Abstract:
Our purpose with this thesis was to find biometric methods that can be used in access control of mobile access. The access control has two parts. Firstly, to validate the identity of the caller and, secondly, to ensure the validated user is not changed during the session that follows. Any solution to the access control problem is not available today, which means that anyone can get access to the mobile phone and the Internet. Therefore we have researched after a solution that can solve this problem but also on how to secure that no one else can take over an already validated session. We began
APA, Harvard, Vancouver, ISO, and other styles
2

Phunchongharn, Phond. "Dynamic wireless access methods with applications to eHealth services." IEEE, 2009. http://hdl.handle.net/1993/9231.

Full text
Abstract:
For opportunistic spectrum access and spectrum sharing in cognitive radio networks, one key problem is how to develop wireless access schemes for secondary users so that harmful interference to primary users can be avoided and quality-of-service (QoS) of secondary users can be guaranteed. In this research, dynamic wireless access protocols for secondary users are designed and optimized for both infrastructure-based and ad-hoc wireless networks. Under the infrastructure-based model, the secondary users are connected through a controller (i.e., an access point). In particular, the problem
APA, Harvard, Vancouver, ISO, and other styles
3

Eaman, Amir. "TEpla: A Certified Type Enforcement Access-Control Policy Language." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39876.

Full text
Abstract:
In today's information era, the security of computer systems as resources of invaluable information is of crucial importance not just to security administrators but also to users of these systems. Access control is an information security process which guards protected resources against unauthorized access as specified by restrictions in security policies. One significant obstacle to regulate access in secure systems is the lack of formal semantics and specifications for the policy languages which are used in writing security policies. Expressing security policies that are implemented pursu
APA, Harvard, Vancouver, ISO, and other styles
4

Slaymaker, Mark Arthur. "The formalisation and transformation of access control policies." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:179cd9d2-0547-42b7-84a0-690bc4478bfb.

Full text
Abstract:
Increasing amounts of data are being collected and stored relating to every aspect of an individual's life, ranging from shopping habits to medical conditions. This data is increasingly being shared for a variety of reasons, from providing vast quantities of data to validate the latest medical hypothesis, to supporting companies in targeting advertising and promotions to individuals that fit a certain profile. In such cases, the data being used often comes from multiple sources --- with each of the contributing parties owning, and being legally responsible for, their own data. Within such mode
APA, Harvard, Vancouver, ISO, and other styles
5

Pacheco, Páramo Diego Felipe. "Performance analysis of access control and resource management methods in heterogeneous networks." Doctoral thesis, Editorial Universitat Politècnica de València, 2014. http://hdl.handle.net/10251/34782.

Full text
Abstract:
El escenario actual de las redes móviles se caracteriza por la creciente demanda de los usuarios por los servicios de datos, circunstancia que se ha visto potenciada por la popularidad de los teléfonos inteligentes y el auge de aplicaciones que necesitan de una conexión permanente a internet, como aquellas que hacen uso de recursos "en la nube" o los servicios de streaming para vídeo. El consumo de datos crece exponencialmente, tanto para los países desarrollados como en los países en desarrollo, y esto ha llevado a los operadores a plantearse soluciones que permitan proveer dichas condiciones
APA, Harvard, Vancouver, ISO, and other styles
6

Subedi, Harendra. "Mathematical Modelling of Delegation in Role Based Access Control." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381.

Full text
Abstract:
One of the most widespread access control model that assigns permissions to a user is Role Based Access Control (RBAC). The basic idea is to limit the access to resources by using the indirection of roles, which are associated both to users and permissions. There has been research conducted with respect to clarifying RBAC and its components, as well as in creating mathematical models describing different aspects of its administrative issues in RBAC. But, till date no work has been done in terms of formalization (Mathematical Modelling) of delegation and revocation of roles in RBAC. Which provi
APA, Harvard, Vancouver, ISO, and other styles
7

Rubio, Medrano Carlos Ernesto. "A formal approach to specifying access control security features of Java modules." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hei, Xiali. "Security Issues and Defense Methods for Wireless Medical Devices." Diss., Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/264269.

Full text
Abstract:
Computer and Information Science<br>Ph.D.<br>This dissertation evaluates the design of several defense schemes for wireless medical devices to address security issues. These schemes are designed to enable efficient and effective access control of wireless medical devices in both non-emergency and emergency situations. In recent years, the range of available wireless medical devices has increased and includes cardiac pacemakers, insulin pump, defibrillators, cochlear implants, neurostimulators, and various drug delivery systems. Unfortunately, most existing wireless medical devices lack suffici
APA, Harvard, Vancouver, ISO, and other styles
9

Hardee, Angelica. "Association of Malaria Control Methods and Healthcare Access among Pregnant Women in the Democratic Republic of the Congo." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1490350707310335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Giannakopoulos, Theophilos John. "Multi-Decision Policy and Policy Combinator Specifications." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-theses/166.

Full text
Abstract:
Margrave is a specification language and analysis tool for access control policies with semantics based in order-sorted logic. The clear logical roots of Margrave's semantics makes policies specified in the Margrave language both machine analyzable and relatively easy for users to reason about. However, the decision conflict resolution declaration and policy set features of Margrave do not have semantics that are as cleanly rooted in order-sorted logic as Margrave policies and queries are. Additionally, the current semantics of decision conflict resolution declarations and of policy sets do
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Access control methods (ACM)"

1

Haykin, Martha E. Smart card technology: New methods for computer access control. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haykin, Martha E. Smart card technology: New methods for computer access control. National Institute of Standards and Technology, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Northeast ACM Symposium on Personal Computer Security (1986 Bentley College). Proceedings of the Northeast ACM Symposium on Personal Computer Security. Association for Computing Machinery, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control, ed. SACMAT '10: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, June 9-11, 2010, Pittsburgh, Pennsylvania, USA. ACM Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., Association for Computing Machinery. Washington, D.C. Chapter., National Institute of Standards and Technology (U.S.), and George Mason University, eds. Proceedings, Fourth ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, October 28-29, 1999. ACM, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control., ed. SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies : Estes Park, Colorado, USA, June 11-13, 2008. Association for Computing Machinery, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control and ACM Digital Library, eds. SACMAT '09: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies : Stresa, Italy, June 3-5, 2009. ACM Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control. and Technische Universität Berlin, eds. Proceedings, Fifth ACM Workshop on Role-Based Access Control: Berlin, Germany, July 26-27, 2000. ACM, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

ACM, Workshop on Role-Based Access Control (3rd 1998 Fairfax Va ). Proceedings: Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 22-23, 1998. ACM, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

ACM Workshop on Role-Based Access Control (1st 1995 Gaithersburg, Md.). Proceedings--First ACM Workshop on Role-Based Access Control: Gaithersburg, Maryland, USA, 30 November - 1 December 1995. Association for Computing Machinery, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Access control methods (ACM)"

1

Wright, Paul. "Privileged Access Control Methods." In Protecting Oracle Database 12c. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6212-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boonkrong, Sirapat. "Methods and Threats of Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schneditz, Daniel, Laura M. Rosales, and Ahmad Taher Azar. "Access Flow Monitoring Methods." In Modelling and Control of Dialysis Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-27458-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huth, Michael. "Formal Methods and Access Control." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ranise, Silvio. "Formal Methods and Access Control." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2024. http://dx.doi.org/10.1007/978-3-642-27739-9_854-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ranise, Silvio. "Formal Methods and Access Control." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lin, Shang-Hung, and S. Y. Kung. "Biometric Identification for Access Control." In Intelligent Methods in Signal Processing and Communications. Birkhäuser Boston, 1997. http://dx.doi.org/10.1007/978-1-4612-2018-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kayem, Anne V. D. M., Selim G. Akl, and Patrick Martin. "A Presentation of Access Control Methods." In Advances in Information Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-6655-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Power, David, Mark Slaymaker, and Andrew Simpson. "Conformance Checking of Dynamic Access Control Policies." In Formal Methods and Software Engineering. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24559-6_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fei, Yuan, and Huibiao Zhu. "Modeling and Verifying NDN Access Control Using CSP." In Formal Methods and Software Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02450-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Access control methods (ACM)"

1

Chakrabarti, Kaushik, and Sharad Mehrotra. "Efficient concurrency control in multidimensional access methods." In the 1999 ACM SIGMOD international conference. ACM Press, 1999. http://dx.doi.org/10.1145/304182.304185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Raje, Satyajeet, Chowdary Davuluri, Michael Freitas, Rajiv Ramnath, and Jay Ramanathan. "Using ontology-based methods for implementing role-based access control in cooperative systems." In the 27th Annual ACM Symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2245276.2245421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sachan, Amit, Sabu Emmanuel, and Mohan S. Kankanhalli. "An efficient access control method for multimedia social networks." In second ACM SIGMM workshop. ACM Press, 2010. http://dx.doi.org/10.1145/1878151.1878162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wilikens, Marc, Simone Feriti, Alberto Sanna, and Marcelo Masera. "A context-related authorization and access control method based on RBAC:." In the seventh ACM symposium. ACM Press, 2002. http://dx.doi.org/10.1145/507711.507730.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Jin Su, Min Gu Kim, Myung-Won Lee, and Sung Bum Pan. "Access control method using electrocardiogram signal for fog computing security." In SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing. ACM, 2020. http://dx.doi.org/10.1145/3341105.3375763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cifuentes, Cristina, Andrew Gross, and Nathan Keynes. "Understanding caller-sensitive method vulnerabilities: a class of access control vulnerabilities in the Java platform." In PLDI '15: ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, 2015. http://dx.doi.org/10.1145/2771284.2771286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ma, Jingtao, Thomas Bauer, Kiel Ova, et al. "Deliver Signal Phase and Timing (SPAT) for Energy Optimization of Vehicle Cohort Via Cloud-Computing and LTE Communications." In WCX SAE World Congress Experience. SAE International, 2023. http://dx.doi.org/10.4271/2023-01-0717.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Predictive Signal Phase and Timing (SPAT) message set is one fundamental building block for vehicle-to-infrastructure (V2I) applications such as Eco-Approach and Departure (EAD) at traffic signal controlled urban intersections. Among the two complementary communication methods namely short-range sidelink (PC5) and long-range cellular radio link (Uu), this paper documents the work with long-range link: the complete data chain includes connecting to the traffic signals via existing backhaul communication network, collectin
APA, Harvard, Vancouver, ISO, and other styles
8

Jaeger, Trent, Antony Edwards, and Xiaolan Zhang. "Managing access control policies using access control spaces." In the seventh ACM symposium. ACM Press, 2002. http://dx.doi.org/10.1145/507711.507713.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Daniel, David Marius, and Borda Monica. "Multimodal access control systems which combines classical access control methods with biometric methods." In 2010 9th International Symposium on Electronics and Telecommunications (ISETC 2010). IEEE, 2010. http://dx.doi.org/10.1109/isetc.2010.5679320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barker, Steve. "Personalizing access control by generalizing access control." In Proceeding of the 15th ACM symposium. ACM Press, 2010. http://dx.doi.org/10.1145/1809842.1809866.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Access control methods (ACM)"

1

Hu, Vincent C., Rick Kuhn, and Dylan Yaga. Verification and test methods for access control policiesmodels. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.sp.800-192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Poole, Joseph, John Barkley, Kevin Brady, Anthony Cincotta, and Wayne Salamon. Distributed communication methods and role-based access control for use in health care applications. National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.ir.5820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thomas, Samuel, Elaine Baker, Kamal Aryal, et al. Towards Climate Resilient Agriculture in Nepal: Solutions for smallholder farmers. International Centre for Integrated Mountain Development (ICIMOD), 2024. https://doi.org/10.53055/icimod.1077.

Full text
Abstract:
Nepal, one of the world’s most climate-vulnerable countries, is facing severe impacts from climate change, particularly in its agricultural sector, which employs two-thirds of the population and contributes more than a quarter of the nation’s GDP. Smallholder farmers, the backbone of this sector, are grappling with rising temperatures, erratic monsoon patterns, droughts, and increasingly frequent extreme weather events. Adapting to these challenges through Climate-Resilient Agriculture (CRA) is essential to ensuring food security and safeguarding the livelihoods of millions. CRA incorporates n
APA, Harvard, Vancouver, ISO, and other styles
4

Howard, Jo. Practical Guides for Participatory Methods: Mapping and Power Analysis. Institute of Development Studies, 2023. http://dx.doi.org/10.19088/ids.2023.002.

Full text
Abstract:
This method enables participants to create a visual map of the key resources and assets in their community, organisation, workplace etc, that are important for their wellbeing and thriving. It is designed to encourage marginalised groups to visually represent and reflect on these resources and the power relations that shape who accesses and controls resources. They map and rank the actors who have more/less power, control and access, and discuss the reasons behind these differences. Finally, a discussion of possible strategies and actions for change can be facilitated.
APA, Harvard, Vancouver, ISO, and other styles
5

Minkanic, Michelle, and Emily Tran. Socioeconomic and Cultural Factors Influencing Type of Hormonal Contraceptive Use in Women in Developed vs Under-Developed Geographic Areas. Science Repository, 2024. http://dx.doi.org/10.31487/j.cei.2024.01.01.

Full text
Abstract:
The intent of this study is to identify and compare sociocultural barriers in various geographic regions that impede access, type and use of hormonal contraception, and methods to improve restrictions in access. Understanding and addressing sociocultural barriers to hormonal contraception on a larger intercontinental scale can create a more effective and inclusive healthcare system. A search using PubMed, Cochrane, and Embase was conducted on current and past literature performed in various developmental countries. Terms such as “birth control access AND developed nations”, “barriers of hormon
APA, Harvard, Vancouver, ISO, and other styles
6

Keshav, Dr Geetha, Dr Suwaibah Fatima Samer, Dr Salman Haroon, and Dr Mohammed Abrar Hassan. TO STUDY THE CORRELATION OF BMI WITH ABO BLOOD GROUP AND CARDIOVASCULAR RISK AMONG MEDICAL STUDENTS. World Wide Journals, 2023. http://dx.doi.org/10.36106/ijar/2405523.

Full text
Abstract:
Introduction: Advancements and increase in access to healthcare have increased the life expectancy in India from 32 years in 1947 to almost 70 years currently. Due to robust vaccination and basic health programs, most of the communicable diseases are kept under control. The disease burden is now skewed towards non-communicable diseases. It is an established fact that body mass index (BMI) is a reliable predictor of cardiovascular disease (CVD) later in life. Early prediction can decrease the disease load and enable early preventative measures. A more novel approach of connecting it with blood
APA, Harvard, Vancouver, ISO, and other styles
7

Stakes, Keith, Keith Stakes, Julie Bryant, Nick Dow, Jack Regan, and Craig Weinschenk. Analysis of the Coordination of Suppression and Ventilation in Multi-Family Dwellings. UL Firefighter Safety Research Institute, 2020. http://dx.doi.org/10.54206/102376/ympj4047.

Full text
Abstract:
The majority of the existing full-scale fire service research studied the impact of tactics on the residential fireground, specifically in single-family structures. This study builds upon prior research by conducting thirteen experiments in three-story, multi-family dwellings to quantify the impact of coordination between ventilation and suppression actions. Experiments were conducted in four, garden-style apartment buildings; each of which had two lower-level units, four first-floor units, and four second-floor units. The apartments shared a common stairwell that was enclosed for all of the e
APA, Harvard, Vancouver, ISO, and other styles
8

Yuan, Yu, Linjia Wang, Yuan Chen, Mengdi Zhou, Bingyu Hu, and Ling Zhao. Acupuncture therapy for subacute and chronic cough in adults: a systematic review and meta analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2022. http://dx.doi.org/10.37766/inplasy2022.7.0110.

Full text
Abstract:
Review question / Objective: The effectiveness of acupuncture in the treatment of subacute and chronic cough. Eligibility criteria: In the literature, the intervention measures of the treatment group were acupuncture or acupuncture combined with other therapies agent, while the control group was placebo or oral non-acupuncture therapy such as western medicine and Chinese medicine; In the same study, when the treatment group was acupuncture combined with other treatment methods, the intervention measures adopted by the control group, except no acupuncture intervention, must be the same as the e
APA, Harvard, Vancouver, ISO, and other styles
9

Тарасова, Олена Юріївна, and Ірина Сергіївна Мінтій. Web application for facial wrinkle recognition. Кривий Ріг, КДПУ, 2022. http://dx.doi.org/10.31812/123456789/7012.

Full text
Abstract:
Facial recognition technology is named one of the main trends of recent years. It’s wide range of applications, such as access control, biometrics, video surveillance and many other interactive humanmachine systems. Facial landmarks can be described as key characteristics of the human face. Commonly found landmarks are, for example, eyes, nose or mouth corners. Analyzing these key points is useful for a variety of computer vision use cases, including biometrics, face tracking, or emotion detection. Different methods produce different facial landmarks. Some methods use only basic facial landmar
APA, Harvard, Vancouver, ISO, and other styles
10

Hossain, Sharif M. I., Shongkour Roy, Sigma Ainul, Abdullah Al Mahmud Shohag, A. T. M. Rezaul Karim, and Ubaidur Rob. Assessing effectiveness of a person-centered group ANC-PNC model among first-time young mothers and their partners for improving quality and use of MNCH-FP services. Population Council, 2022. http://dx.doi.org/10.31899/sbsr2022.1041.

Full text
Abstract:
This baseline report is part of an operations research project “Healthy Women, Healthy Families (HWHF): Shustha Ma, Shustha Poribar” led by Management Sciences for Health (MSH) in partnership with BRAC, SCOPE, and the Population Council. The project aims to improve quality and increase utilization of maternal, newborn, and child health (MNCH) and family planning (FP) services and information for young mothers-to-be, first-time mothers (FTMs) aged 15-24, and their partners in the urban municipality of Tongi, Gazipur District, Bangladesh, through a group antenatal care ANC-PNC approach. The obje
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!