Academic literature on the topic 'Access control methods (ACM)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Access control methods (ACM).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Access control methods (ACM)"
Asthana, Abhishek, and Padma Lochan Pradhan. "Proposed Abelian ACM Method Optimizing." International Journal of Security and Privacy in Pervasive Computing 13, no. 4 (2021): 33–52. http://dx.doi.org/10.4018/ijsppc.2021100103.
Full textKryzhanovskii, S. A., I. B. Tsorin, E. O. Ionova, S. A. Simonenko, and M. B. Vititnova. "Blood microcirculation under conditions of a translational model of alcohol cardiomyopathy in rats." Pharmacokinetics and Pharmacodynamics, no. 2 (August 8, 2024): 43–49. http://dx.doi.org/10.37489/2587-7836-2024-2-43-49.
Full textLeyva-Mayorga, Israel, Miguel Rodriguez-Hernandez, Vicent Pla, and Jorge Martinez-Bauset. "Filtering Methods for Efficient Dynamic Access Control in 5G Massive Machine-Type Communication Scenarios." Electronics 8, no. 1 (2018): 27. http://dx.doi.org/10.3390/electronics8010027.
Full textKaur, Amardeep, and Amandeep Verma. "Adaptive Access Control Mechanism (AACM) for Enterprise Cloud Computing." Journal of Electrical and Computer Engineering 2023 (July 13, 2023): 1–30. http://dx.doi.org/10.1155/2023/3922393.
Full textGlennie, Miriam, Karen Gardner, Michelle Dowden, and Bart J. Currie. "Active case detection methods for crusted scabies and leprosy: A systematic review." PLOS Neglected Tropical Diseases 15, no. 7 (2021): e0009577. http://dx.doi.org/10.1371/journal.pntd.0009577.
Full textWijaya, Cahyo Candra, and Ade Surya Budiman. "Perancangan Keamanan Jaringan Komputer Pada Router Dengan Metode ACL Pada PT. Aruna Sinar Jaya Jakarta." JOURNAL ZETROEM 5, no. 2 (2023): 180–86. http://dx.doi.org/10.36526/ztr.v5i2.3077.
Full textKryzhanovskii, S. A., I. B. Tsorin, E. O. Ionova, et al. "Study of the relationship between the severity of alcoholic cardiomyopathy and the level of alcohol consumption in male and female rats in the model of “home drinking”." Pharmacokinetics and Pharmacodynamics, no. 3 (November 3, 2023): 82–93. http://dx.doi.org/10.37489/2587-7836-2023-3-82-93.
Full textİSLAM, Mahmud, and Kenan Evren ÖZTOP. "Predialysis education program and early vascular access: a single center experience." Anatolian Current Medical Journal 5, no. 4 (2023): 355–59. http://dx.doi.org/10.38053/acmj.1331260.
Full textSweetenham, John W., Basit Iqbal Chaudhry, Benjamin Teng, Andrew Yue, and Nora Connor. "The use of quasi-experimental design methods to evaluate and improve the impact of acute care centers on oncologic emergencies." Journal of Clinical Oncology 39, no. 15_suppl (2021): e13515-e13515. http://dx.doi.org/10.1200/jco.2021.39.15_suppl.e13515.
Full textSaroh. "A Scoping Review: Unveiling the Benefits of ACF on Tuberculosis Control." Jurnal Promkes 12, no. 2 (2024): 272–80. http://dx.doi.org/10.20473/jpk.v12.i2.2024.272-280.
Full textDissertations / Theses on the topic "Access control methods (ACM)"
Fransson, Linda, and Therese Jeansson. "Biometric methods and mobile access control." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5023.
Full textPhunchongharn, Phond. "Dynamic wireless access methods with applications to eHealth services." IEEE, 2009. http://hdl.handle.net/1993/9231.
Full textEaman, Amir. "TEpla: A Certified Type Enforcement Access-Control Policy Language." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39876.
Full textSlaymaker, Mark Arthur. "The formalisation and transformation of access control policies." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:179cd9d2-0547-42b7-84a0-690bc4478bfb.
Full textPacheco, Páramo Diego Felipe. "Performance analysis of access control and resource management methods in heterogeneous networks." Doctoral thesis, Editorial Universitat Politècnica de València, 2014. http://hdl.handle.net/10251/34782.
Full textSubedi, Harendra. "Mathematical Modelling of Delegation in Role Based Access Control." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381.
Full textRubio, Medrano Carlos Ernesto. "A formal approach to specifying access control security features of Java modules." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textHei, Xiali. "Security Issues and Defense Methods for Wireless Medical Devices." Diss., Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/264269.
Full textHardee, Angelica. "Association of Malaria Control Methods and Healthcare Access among Pregnant Women in the Democratic Republic of the Congo." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1490350707310335.
Full textGiannakopoulos, Theophilos John. "Multi-Decision Policy and Policy Combinator Specifications." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-theses/166.
Full textBooks on the topic "Access control methods (ACM)"
Haykin, Martha E. Smart card technology: New methods for computer access control. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1988.
Find full textHaykin, Martha E. Smart card technology: New methods for computer access control. National Institute of Standards and Technology, 1988.
Find full textNortheast ACM Symposium on Personal Computer Security (1986 Bentley College). Proceedings of the Northeast ACM Symposium on Personal Computer Security. Association for Computing Machinery, 1987.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control, ed. SACMAT '10: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, June 9-11, 2010, Pittsburgh, Pennsylvania, USA. ACM Press, 2010.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control., Association for Computing Machinery. Washington, D.C. Chapter., National Institute of Standards and Technology (U.S.), and George Mason University, eds. Proceedings, Fourth ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, October 28-29, 1999. ACM, 1999.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control., ed. SACMAT '08: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies : Estes Park, Colorado, USA, June 11-13, 2008. Association for Computing Machinery, 2008.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control and ACM Digital Library, eds. SACMAT '09: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies : Stresa, Italy, June 3-5, 2009. ACM Press, 2009.
Find full textAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control. and Technische Universität Berlin, eds. Proceedings, Fifth ACM Workshop on Role-Based Access Control: Berlin, Germany, July 26-27, 2000. ACM, 2000.
Find full textACM, Workshop on Role-Based Access Control (3rd 1998 Fairfax Va ). Proceedings: Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 22-23, 1998. ACM, 1998.
Find full textACM Workshop on Role-Based Access Control (1st 1995 Gaithersburg, Md.). Proceedings--First ACM Workshop on Role-Based Access Control: Gaithersburg, Maryland, USA, 30 November - 1 December 1995. Association for Computing Machinery, 1995.
Find full textBook chapters on the topic "Access control methods (ACM)"
Wright, Paul. "Privileged Access Control Methods." In Protecting Oracle Database 12c. Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6212-1_13.
Full textBoonkrong, Sirapat. "Methods and Threats of Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_3.
Full textSchneditz, Daniel, Laura M. Rosales, and Ahmad Taher Azar. "Access Flow Monitoring Methods." In Modelling and Control of Dialysis Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-27458-9_6.
Full textHuth, Michael. "Formal Methods and Access Control." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_854.
Full textRanise, Silvio. "Formal Methods and Access Control." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2024. http://dx.doi.org/10.1007/978-3-642-27739-9_854-2.
Full textRanise, Silvio. "Formal Methods and Access Control." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_854.
Full textLin, Shang-Hung, and S. Y. Kung. "Biometric Identification for Access Control." In Intelligent Methods in Signal Processing and Communications. Birkhäuser Boston, 1997. http://dx.doi.org/10.1007/978-1-4612-2018-3_4.
Full textKayem, Anne V. D. M., Selim G. Akl, and Patrick Martin. "A Presentation of Access Control Methods." In Advances in Information Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-6655-1_2.
Full textPower, David, Mark Slaymaker, and Andrew Simpson. "Conformance Checking of Dynamic Access Control Policies." In Formal Methods and Software Engineering. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24559-6_17.
Full textFei, Yuan, and Huibiao Zhu. "Modeling and Verifying NDN Access Control Using CSP." In Formal Methods and Software Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02450-5_9.
Full textConference papers on the topic "Access control methods (ACM)"
Chakrabarti, Kaushik, and Sharad Mehrotra. "Efficient concurrency control in multidimensional access methods." In the 1999 ACM SIGMOD international conference. ACM Press, 1999. http://dx.doi.org/10.1145/304182.304185.
Full textRaje, Satyajeet, Chowdary Davuluri, Michael Freitas, Rajiv Ramnath, and Jay Ramanathan. "Using ontology-based methods for implementing role-based access control in cooperative systems." In the 27th Annual ACM Symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2245276.2245421.
Full textSachan, Amit, Sabu Emmanuel, and Mohan S. Kankanhalli. "An efficient access control method for multimedia social networks." In second ACM SIGMM workshop. ACM Press, 2010. http://dx.doi.org/10.1145/1878151.1878162.
Full textWilikens, Marc, Simone Feriti, Alberto Sanna, and Marcelo Masera. "A context-related authorization and access control method based on RBAC:." In the seventh ACM symposium. ACM Press, 2002. http://dx.doi.org/10.1145/507711.507730.
Full textKim, Jin Su, Min Gu Kim, Myung-Won Lee, and Sung Bum Pan. "Access control method using electrocardiogram signal for fog computing security." In SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing. ACM, 2020. http://dx.doi.org/10.1145/3341105.3375763.
Full textCifuentes, Cristina, Andrew Gross, and Nathan Keynes. "Understanding caller-sensitive method vulnerabilities: a class of access control vulnerabilities in the Java platform." In PLDI '15: ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, 2015. http://dx.doi.org/10.1145/2771284.2771286.
Full textMa, Jingtao, Thomas Bauer, Kiel Ova, et al. "Deliver Signal Phase and Timing (SPAT) for Energy Optimization of Vehicle Cohort Via Cloud-Computing and LTE Communications." In WCX SAE World Congress Experience. SAE International, 2023. http://dx.doi.org/10.4271/2023-01-0717.
Full textJaeger, Trent, Antony Edwards, and Xiaolan Zhang. "Managing access control policies using access control spaces." In the seventh ACM symposium. ACM Press, 2002. http://dx.doi.org/10.1145/507711.507713.
Full textDaniel, David Marius, and Borda Monica. "Multimodal access control systems which combines classical access control methods with biometric methods." In 2010 9th International Symposium on Electronics and Telecommunications (ISETC 2010). IEEE, 2010. http://dx.doi.org/10.1109/isetc.2010.5679320.
Full textBarker, Steve. "Personalizing access control by generalizing access control." In Proceeding of the 15th ACM symposium. ACM Press, 2010. http://dx.doi.org/10.1145/1809842.1809866.
Full textReports on the topic "Access control methods (ACM)"
Hu, Vincent C., Rick Kuhn, and Dylan Yaga. Verification and test methods for access control policiesmodels. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.sp.800-192.
Full textPoole, Joseph, John Barkley, Kevin Brady, Anthony Cincotta, and Wayne Salamon. Distributed communication methods and role-based access control for use in health care applications. National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.ir.5820.
Full textThomas, Samuel, Elaine Baker, Kamal Aryal, et al. Towards Climate Resilient Agriculture in Nepal: Solutions for smallholder farmers. International Centre for Integrated Mountain Development (ICIMOD), 2024. https://doi.org/10.53055/icimod.1077.
Full textHoward, Jo. Practical Guides for Participatory Methods: Mapping and Power Analysis. Institute of Development Studies, 2023. http://dx.doi.org/10.19088/ids.2023.002.
Full textMinkanic, Michelle, and Emily Tran. Socioeconomic and Cultural Factors Influencing Type of Hormonal Contraceptive Use in Women in Developed vs Under-Developed Geographic Areas. Science Repository, 2024. http://dx.doi.org/10.31487/j.cei.2024.01.01.
Full textKeshav, Dr Geetha, Dr Suwaibah Fatima Samer, Dr Salman Haroon, and Dr Mohammed Abrar Hassan. TO STUDY THE CORRELATION OF BMI WITH ABO BLOOD GROUP AND CARDIOVASCULAR RISK AMONG MEDICAL STUDENTS. World Wide Journals, 2023. http://dx.doi.org/10.36106/ijar/2405523.
Full textStakes, Keith, Keith Stakes, Julie Bryant, Nick Dow, Jack Regan, and Craig Weinschenk. Analysis of the Coordination of Suppression and Ventilation in Multi-Family Dwellings. UL Firefighter Safety Research Institute, 2020. http://dx.doi.org/10.54206/102376/ympj4047.
Full textYuan, Yu, Linjia Wang, Yuan Chen, Mengdi Zhou, Bingyu Hu, and Ling Zhao. Acupuncture therapy for subacute and chronic cough in adults: a systematic review and meta analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2022. http://dx.doi.org/10.37766/inplasy2022.7.0110.
Full textТарасова, Олена Юріївна, and Ірина Сергіївна Мінтій. Web application for facial wrinkle recognition. Кривий Ріг, КДПУ, 2022. http://dx.doi.org/10.31812/123456789/7012.
Full textHossain, Sharif M. I., Shongkour Roy, Sigma Ainul, Abdullah Al Mahmud Shohag, A. T. M. Rezaul Karim, and Ubaidur Rob. Assessing effectiveness of a person-centered group ANC-PNC model among first-time young mothers and their partners for improving quality and use of MNCH-FP services. Population Council, 2022. http://dx.doi.org/10.31899/sbsr2022.1041.
Full text