Journal articles on the topic 'Access control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Access control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chepuru, Anitha, Dr K. Venugopal Rao, and Amardeep Matta. "Server Access Control." International Journal of Scientific Research 1, no. 7 (2012): 78–79. http://dx.doi.org/10.15373/22778179/dec2012/31.
Full textSaunders, G., M. Hitchens, and V. Varadharajan. "Role-based access control and the access control matrix." ACM SIGOPS Operating Systems Review 35, no. 4 (2001): 6–20. http://dx.doi.org/10.1145/506084.506085.
Full textAbd-Ali, Jamal. "A Metamodel for Hybrid Access Control Policies." Journal of Software 10, no. 7 (2015): 784–87. http://dx.doi.org/10.17706//jsw.10.7.784-797.
Full textPenelova, Maria. "Access Control Models." Cybernetics and Information Technologies 21, no. 4 (2021): 77–104. http://dx.doi.org/10.2478/cait-2021-0044.
Full textSchuldt, Alison. "PAR access control." Nature Reviews Molecular Cell Biology 12, no. 11 (2011): 693. http://dx.doi.org/10.1038/nrm3220.
Full textSubramanian, Savithri. "Control and access." Contributions to Indian Sociology 42, no. 1 (2008): 93–122. http://dx.doi.org/10.1177/006996670704200105.
Full textFriedman, Michael. "Access-control software." Computers & Security 7, no. 5 (1988): 523. http://dx.doi.org/10.1016/0167-4048(88)90293-3.
Full textCollinson, Helen. "Workstation access control." Computers & Security 14, no. 2 (1995): 121. http://dx.doi.org/10.1016/0167-4048(95)90061-6.
Full textYaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures." Information Resources Management Journal 30, no. 4 (2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.
Full textIkponmwosa, Oghogho, Otuagoma S., Ufuoma Jeffrey Okieke, et al. "FACE RECOGNITION SYSTEM FOR AUTOMATIC DOOR ACCESS CONTROL." Engineering and Technology Journal 08, no. 02 (2023): 1981–85. http://dx.doi.org/10.47191/etj/v8i2.03.
Full textZuva, T. "Hybridization of Bimodal Biometrics for Access Control Authentication." International Journal of Future Computer and Communication 3, no. 6 (2014): 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.
Full textShuriya.b, Shuriya b. "Role based Access Control using Cp-Abe Algorithm." Indian Journal of Applied Research 4, no. 7 (2011): 171–72. http://dx.doi.org/10.15373/2249555x/july2014/51.
Full textVinay, Kamisetty. "Blockchain Based Access Control System for Cloud Storage." International Journal of Science and Research (IJSR) 11, no. 12 (2022): 143–44. http://dx.doi.org/10.21275/sr221202104520.
Full textKAINZ, Ondrej, Ján DROZD, Miroslav MICHALKO, and František JAKAB. "RASPBERRY PI-BASED ACCESS CONTROL USING FACE RECOGNITION." Acta Electrotechnica et Informatica 19, no. 4 (2020): 15–20. http://dx.doi.org/10.15546/aeei-2019-0025.
Full textZhou, Zhenji, Lifa Wu, and Zheng Hong. "Context-Aware Access Control Model for Cloud Computing." International Journal of Grid and Distributed Computing 6, no. 6 (2013): 1–12. http://dx.doi.org/10.14257/ijgdc.2013.6.6.01.
Full textKarjoth, Günter. "Access control with IBM Tivoli access manager." ACM Transactions on Information and System Security 6, no. 2 (2003): 232–57. http://dx.doi.org/10.1145/762476.762479.
Full textR. Bauer Mengelberg, Juan. "Teaching System Access Control." Issues in Informing Science and Information Technology 2 (2005): 139–58. http://dx.doi.org/10.28945/817.
Full textJunquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Full textBaláž, Anton, Branislav Madoš, and Michal Ambróz. "Android Access Control Extension." Acta Informatica Pragensia 4, no. 3 (2015): 310–17. http://dx.doi.org/10.18267/j.aip.77.
Full textHamby, Sherry. "Coercion, Access, and Control." Criminal Justice Review 43, no. 1 (2018): 5–9. http://dx.doi.org/10.1177/0734016817751581.
Full textYe, Shuiming, Ying Luo, Jian Zhao, and Sen-ChingS Cheung. "Anonymous Biometric Access Control." EURASIP Journal on Information Security 2009, no. 1 (2009): 865259. http://dx.doi.org/10.1186/1687-417x-2009-865259.
Full textToledo, Rodolfo, Angel Nunez, Eric Tanter, and Jacques Noye. "Aspectizing Java Access Control." IEEE Transactions on Software Engineering 38, no. 1 (2012): 101–17. http://dx.doi.org/10.1109/tse.2011.6.
Full textToledo, Rodolfo, and Eric Tanter. "Access Control in JavaScript." IEEE Software 28, no. 5 (2011): 76–84. http://dx.doi.org/10.1109/ms.2010.154.
Full textAlhamdani, Wasim A. "Resilent Access Control Model." Journal of Applied Security Research 12, no. 4 (2017): 478–96. http://dx.doi.org/10.1080/19361610.2017.1354273.
Full textBarker, Steve, Marek J. Sergot, and Duminda Wijesekera. "Status-Based Access Control." ACM Transactions on Information and System Security 12, no. 1 (2008): 1–47. http://dx.doi.org/10.1145/1410234.1410235.
Full textКОРЧИНСЬКИЙ, ВОЛОДИМИР, ІРИНА ТАРАСЕНКО, СЕРГІЙ РАЦИБОРИНСЬКИЙ, ОЛЕКСАНДР АКАЄВ, and АРТЕМ ХАДЖИОГЛО. "AUTOMATED ACCESS CONTROL SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 333, no. 2 (2024): 140–45. http://dx.doi.org/10.31891/2307-5732-2024-333-2-22.
Full textStevens, Gunnar, and Volker Wulf. "Computer-supported access control." ACM Transactions on Computer-Human Interaction 16, no. 3 (2009): 1–26. http://dx.doi.org/10.1145/1592440.1592441.
Full textStankovski, Stevan, Gordana Ostojic, Nikola Djukic, Srdjan Tegeltija, and Aleksandar Milojkovic. "Bluetooth parking access control." Sensor Review 34, no. 3 (2014): 244–54. http://dx.doi.org/10.1108/sr-06-2012-643.
Full textHu, Vincent C., D. Richard Kuhn, and David F. Ferraiolo. "Attribute-Based Access Control." Computer 48, no. 2 (2015): 85–88. http://dx.doi.org/10.1109/mc.2015.33.
Full textMoffett, Jonathan D., and Morris S. Sloman. "Content-dependent access control." ACM SIGOPS Operating Systems Review 25, no. 2 (1991): 63–70. http://dx.doi.org/10.1145/122120.122125.
Full textHu, Vincent C., and Rick Kuhn. "Access Control Policy Verification." Computer 49, no. 12 (2016): 80–83. http://dx.doi.org/10.1109/mc.2016.368.
Full textNicola, Rocco De, GianLuigi Ferrari, Rosario Pugliese, and Betti Venneri. "Types for access control." Theoretical Computer Science 240, no. 1 (2000): 215–54. http://dx.doi.org/10.1016/s0304-3975(99)00232-7.
Full textMurray, Bill. "Security and access control." Computer Fraud & Security Bulletin 1992, no. 12 (1992): 10–15. http://dx.doi.org/10.1016/s0142-0496(09)90145-x.
Full textParker, T. A. "Network access control developments." Computer Audit Update 1990, no. 6 (1990): 3–10. http://dx.doi.org/10.1016/s0960-2593(05)80056-4.
Full textJackson, Keith. "Horatius access control system." Computer Fraud & Security Bulletin 11, no. 6 (1989): 17–19. http://dx.doi.org/10.1016/0142-0496(89)90204-x.
Full textGan, Guohua, E. Chen, Zhiyuan Zhou, and Yan Zhu. "Token-Based Access Control." IEEE Access 8 (2020): 54189–99. http://dx.doi.org/10.1109/access.2020.2979746.
Full textDomingo-Ferrer, Joseph. "Algorithm- sequenced access control." Computers & Security 10, no. 7 (1991): 639–52. http://dx.doi.org/10.1016/0167-4048(91)90122-t.
Full textParker, Tom. "Role based access control." Computers & Security 14, no. 5 (1995): 418. http://dx.doi.org/10.1016/0167-4048(95)97115-q.
Full textBhatia, Rekha, and Manpreet Singh Gujral. "Privacy Aware Access Control." International Journal of Information Technologies and Systems Approach 10, no. 2 (2017): 17–30. http://dx.doi.org/10.4018/ijitsa.2017070102.
Full textYe, Shuiming, Ying Luo, Jian Zhao, and Sen-Ching S. Cheung. "Anonymous Biometric Access Control." EURASIP Journal on Information Security 2009 (2009): 1–17. http://dx.doi.org/10.1155/2009/865259.
Full textКОРЧИНСЬКИЙ, ВОЛОДИМИР, ІРИНА ТАРАСЕНКО, СЕРГІЙ РАЦИБОРИНСЬКИЙ, ОЛЕКСАНДР АКАЄВ, and АРТЕМ ХАДЖИОГЛО. "AUTOMATED ACCESS CONTROL SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 331, no. 1 (2024): 291–96. http://dx.doi.org/10.31891/2307-5732-2024-331-44.
Full textDUNDUA, Besik, Khimuri RUKHAIA, Mikheili RUKHAIA та Lali TIBUA. "PρLog for Access Control". Journal of Technical Science and Technologies 5, № 2 (2017): 41–44. http://dx.doi.org/10.31578/jtst.v5i2.108.
Full textKim, Jinsu, and Namje Park. "Role Based Access Control based File Access Control Mechanism with Smart Contract." Journal of Korean Institute of Information Technology 17, no. 9 (2019): 113–21. http://dx.doi.org/10.14801/jkiit.2019.17.9.113.
Full textBertolino, Antonia, Said Daoudagh, Francesca Lonetti, Eda Marchetti, and Louis Schilders. "Automated testing of eXtensible Access Control Markup Language‐based access control systems." IET Software 7, no. 4 (2013): 203–12. http://dx.doi.org/10.1049/iet-sen.2012.0101.
Full textLobo, Jorge. "Relationship-based access control: More than a social network access control model." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 9, no. 2 (2018): e1282. http://dx.doi.org/10.1002/widm.1282.
Full textDanilescu, Marcel. "MODELING ACCESS CONTROL AND USER ACTIONS USING TRUST - BASED ACCESS CONTROL POLICIES." Journal of Social Sciences III (3) (September 1, 2020): 72–84. https://doi.org/10.5281/zenodo.3971967.
Full textLijun Chen, S. H. Low, and J. C. Doyle. "Random Access Game and Medium Access Control Design." IEEE/ACM Transactions on Networking 18, no. 4 (2010): 1303–16. http://dx.doi.org/10.1109/tnet.2010.2041066.
Full textZhu, Nafei, Fangbo Cai, Jingsha He, Yixuan Zhang, Wenxin Li, and Zhao Li. "Management of access privileges for dynamic access control." Cluster Computing 22, S4 (2018): 8899–917. http://dx.doi.org/10.1007/s10586-018-2018-1.
Full textLun-wei, Wang, Liao Xiang-ke, and Wang Huai-min. "Access request trustworthiness in weighted access control framework." Wuhan University Journal of Natural Sciences 10, no. 1 (2005): 65–69. http://dx.doi.org/10.1007/bf02828619.
Full textDanilescu, Marcel, and Victor Besliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII, no. 2 (2021): 67–78. http://dx.doi.org/10.52326/jes.utm.2021.28(2).05.
Full text