Academic literature on the topic 'Time based access control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Time based access control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Time based access control"

1

Han, Chun Yan, Lian Zhong Liu, and Yi Fei Yuan. "Time Constraints of Access Control." Applied Mechanics and Materials 602-605 (August 2014): 3791–95. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3791.

Full text
Abstract:
Currently, researches on time constraints for access control are not complete. To solve this problem, this paper enriches the time constraints for access control from the following aspects: firstly, we propose a four-tuple representation of time constraint by combining discrete time representation and periodic time representation; secondly, we put forward a function of computing the time of state changing on the basis of (1); finally, aiming at conflicts detecting and resolution for time constraints, we raise an algorithm for conflicts detection and resolution based on XACML and entities overl
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Chaoqun, Zhen Peng, and Lili Wu. "Role of Time-Domain Based Access Control Model." Journal of Software Engineering and Applications 09, no. 02 (2016): 57–62. http://dx.doi.org/10.4236/jsea.2016.92004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Suchendra, Devie Ryana, Dewi Putri Suryani, and Muhammad Ikhsan Sani. "Home Lighting Control Based on Time Scheduling using Crontab." IJAIT (International Journal of Applied Information Technology) 2, no. 01 (2018): 1. http://dx.doi.org/10.25124/ijait.v2i01.924.

Full text
Abstract:
Access control system in smart home concept is a support system that affects especially on controlling the electronic devices. Along with advances in technology, the conventional access control system was developed into an electronic-based access control system. A conventional access control system such as manual electric switches is now beginning to be developed with an electric switch that can be controlled wirelessly from the web. Raspberry pi 2 model B is one of the minicomputers which can be used in an automatic access control system. By using GPIO (General Purpose Input Output) on Raspbe
APA, Harvard, Vancouver, ISO, and other styles
4

Ma, Haifeng, and Yangmin Li. "Multi-Power Reaching Law Based Discrete-Time Sliding-Mode Control." IEEE Access 7 (2019): 49822–29. http://dx.doi.org/10.1109/access.2019.2904103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Lili, Qi Zhao, Li Wang, and Lingyu Zhang. "Urban Intersection Signal Control Based on Time-Space Resource Scheduling." IEEE Access 9 (2021): 49281–91. http://dx.doi.org/10.1109/access.2021.3059496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Danilescu, Marcel, and Victor Besliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII, no. 2 (2021): 67–78. http://dx.doi.org/10.52326/jes.utm.2021.28(2).05.

Full text
Abstract:
In recent decades, the number of researches on access control and user actions in computer systems has increased. Over time, there have been two models of implementing Mandatory Access Control (MAC) policies for government institutions and Discretionary Access Control (DAC) for the business environment, policies that various access control modeling solutions seek to implement. Among the access control modeling solutions developed are Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), presented in the U.S.A. by the National Institute of Standard and Technology (NIST). I
APA, Harvard, Vancouver, ISO, and other styles
7

Luo, Yiping, and Junling Zhu. "Finite-Time Average Consensus Control of Multi-Agent Systems Based on the Aperiodically Intermittent Control." IEEE Access 10 (2022): 14959–68. http://dx.doi.org/10.1109/access.2022.3149278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Duan, Gui-Jiang, and Xin Yan. "A Real-Time Quality Control System Based on Manufacturing Process Data." IEEE Access 8 (2020): 208506–17. http://dx.doi.org/10.1109/access.2020.3038394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Guo, Jie, Zhanshan Zhao, Fengdong Shi, Ruikun Wang, and Shasha Li. "Observer-Based Synchronization Control for Coronary Artery Time-Delay Chaotic System." IEEE Access 7 (2019): 51222–35. http://dx.doi.org/10.1109/access.2019.2909749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Aznar-Poveda, Juan, Esteban Egea-Lopez, Antonio-Javier Garcia-Sanchez, and Pablo Pavon-Marino. "Time-to-Collision-Based Awareness and Congestion Control for Vehicular Communications." IEEE Access 7 (2019): 154192–208. http://dx.doi.org/10.1109/access.2019.2949131.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Time based access control"

1

Jaggi, Felix P. "An access control model based on time and events." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28945.

Full text
Abstract:
A new access control model incorporating the notion of time and events is introduced. It allows the specification of fine-grained and flexible security policies which are sensitive to the operating environment. The system constraints, expressed in terms of access windows and obligations, are stored in extended access control lists. The addition of a capability mechanism gives another dimension of protection and added flexibility, so that the flexibility and expressive power of the system constraints is fully supported by the underlying mechanism. The approach is compared to several existing mo
APA, Harvard, Vancouver, ISO, and other styles
2

Alsarhani, Sami. "Reasoning about history based access control policy using past time operators of interval temporal logic." Thesis, De Montfort University, 2014. http://hdl.handle.net/2086/10406.

Full text
Abstract:
Interval Temporal Logic (ITL) is a flexible notation for the propositional and first-order logical reasoning about periods of time that exist in specifications of hardware and software systems. ITL is different from other temporal logics since it can deal with both sequential and parallel composition and provides powerful and extensible specification and verification methods for reasoning about properties such as safety, time projection and liveness. Most imperative programming constructs can be seen as ITL formula that form the basis of an executable framework called Tempura that is used for
APA, Harvard, Vancouver, ISO, and other styles
3

Knight, G. S. "Scenario-based access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aktoudianakis, Evangelos. "Relationship based access control." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/809642/.

Full text
Abstract:
Relationship Based Access Control (ReBAC) has emerged as a popular alternative to traditional access control models, such as Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC). However, some of the model's aspects, such as its expression language and delegation abilities have not been studied in depth. Further-more, existing ReBAC models cater to single policy control, thus not taking into account cases were many access control policies might apply to a single access control object. We propose a ReBAC model, set theoretic ReBac (STReBAC), which bases its expression lang
APA, Harvard, Vancouver, ISO, and other styles
5

Magnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.

Full text
Abstract:
<p>Role based access control (RBAC) is widely used in health care systems today. Some of the biggest systems in use at Norwegian hospitals utilizes role based integration. The basic concept of RBAC is that users are assigned to roles, permissions are assigned to roles and users acquire permissions by being members of roles. An alternative approach to the role based access distribution, is that information should be available only to those who are taking active part in a patient’s treatment. This approach is called decision based access control (DBAC). While some RBAC implementations grant acce
APA, Harvard, Vancouver, ISO, and other styles
6

Klöck, Clemens. "Auction-based Medium Access Control." [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000007323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Macfie, Alex. "Semantic role-based access control." Thesis, University of Westminster, 2014. https://westminsterresearch.westminster.ac.uk/item/964y2/semantic-role-based-access-control.

Full text
Abstract:
In this thesis we propose two semantic ontological role-based access control (RBAC) reasoning processes. These processes infer user authorisations according to a set of role permission and denial assignments, together with user role assignments. The first process, SO-RBAC (Semantic Ontological Role-Based Access Control) uses OWL-DL to store the ontology, and SWRL to perform reasoning. It is based mainly on RBAC models previously described using Prolog. This demonstrates the feasibility of writing an RBAC model in OWL and performing reasoning inside it, but is still tied closely to descriptive
APA, Harvard, Vancouver, ISO, and other styles
8

Belokosztolszki, András. "Role-based access control policy administration." Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.615798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pang, Kenneth K. (Kenneth Kwok Kit) 1976. "Fine-grained event-based access control." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47532.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; and, Thesis (B.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.<br>Includes bibliographical references (leaf 46).<br>by Kenneth K. Pang.<br>B.S.<br>M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
10

Montrieux, Lionel. "Model-based analysis of role-based access control." Thesis, Open University, 2013. http://oro.open.ac.uk/38672/.

Full text
Abstract:
Model-Driven Engineering (MDE) has been extensively studied. Many directions have been explored, sometimes with the dream of providing a fully integrated approach for designers, developers and other stakeholders to create, reason about and modify models representing software systems. Most, but not all, of the research in MDE has focused on general-purpose languages and models, such as Java and UML. Domain-specific and cross-cutting concerns, such as security, are increasingly essential parts of a software system, but are only treated as second-class citizens in the most popular modelling langu
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Time based access control"

1

Zhang, Rui. Relation based access control. AKA, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ferraiolo, David. Role-based access control. 2nd ed. Artech House, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ferraiolo, David. Role-based access controls. Artech House, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yuen, Clement. Rate control with pricing in contention-based access networks. National Library of Canada, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kogan, Konstantin, and Eugene Khmelnitsky. Scheduling: Control-Based Theory and Polynomial-Time Algorithms. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4675-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kogan, Konstantin. Scheduling: Control-based theory and polynomial-time algorithms. Kluwer Academic Publishers, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hendrick, Thomas E. Purchasing's contributions to time-based strategies. Center for Advanced Purchasing Studies, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Larson, Richard R. A rule-based system for real-time analysis of control systems. National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Larson, Richard R. A rule-based system for real-time analysis of control systems. National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Larson, Richard R. A rule-based system for real-time analysis of control systems. National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Time based access control"

1

Limkar, Suresh, Nivedita Kadam, and Rakesh Kumar Jha. "Access Control Based on Location and Time." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32573-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chiang, Chia-Chu, and Coskun Bayrak. "Concurrency and Time in Role-Based Access Control." In Advances in Information Security and Its Application. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02633-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zou, Lei, Zidong Wang, and Jinling Liang. "Recursive Filtering for Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zou, Lei, Zidong Wang, and Jinling Liang. "Observer-Based $${\mathscr {H}}_{\infty }$$ Control of Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zou, Lei, Zidong Wang, and Jinling Liang. "Finite-Horizon $${\mathscr {H}}_{\infty }$$ Fault Estimation of Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yuan, Zhiyong, Changcheng Zhou, Yiqing Lian, Qingshan Xu, and Siyu Tao. "Multi-point Access Decentralized Wind Power Time Series Model Based on MCMC Algorithm and Hierarchical Clustering Algorithm." In Proceedings of PURPLE MOUNTAIN FORUM 2019-International Forum on Smart Grid Protection and Control. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9783-7_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Jiawei, Yanbo Yang, Ning Lu, Zhiwei Liu, and Jianfeng Ma. "A Privacy-Aware and Time-Limited Data Access Control Scheme with Large Universe and Public Traceability for Cloud-Based IoD." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96791-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jyothi, E. V. N., V. Purna Chandra Rao, and B. Rajani. "Study on Recent Method of Dynamic Time-Based Encryption (DTBE) and Searchable Access Control Scheme for Personal Health Record in Cloud Computing." In Cybernetics, Cognition and Machine Learning Applications. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhao, Yujuan, Baojiang Cui, and Jie Xu. "A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain." In Communications in Computer and Information Science. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9229-1_2.

Full text
Abstract:
AbstractWith the continuous development of distributed technology, blockchain has been widely applied to solve practical problems in various fields. Its advantages such as decentralization and non-tamperability perfectly meet the needs of permanent query of traceability scene information, and can solve the trust problem of multi-party participation in various links. At the same time, as data security has received more and more attention. The privacy protection and permission control of “on-chain” data need to be resolved. Medical data records are very valuable and sensitive data. Reliable storage and credible traceability are of great significance to the health of patients and the long-term development of medical undertakings. To issue the above problems, here, we propose a secure medical data traceability system that combines data desensitization and attribute-based encryption algorithms to achieve the traceability capabilities and ensure the reliable storage of medical data records on blockchain. Data desensitization provides a certain degree of security for sensitive data involving personal information in medical data. The introduction of attribute encryption has solved the problem of unauthorized access to data. Finally, we analyzed the security of the solution and Verify the efficiency of the program.
APA, Harvard, Vancouver, ISO, and other styles
10

Jyothi, E. V. N., V. Purna Chandra Rao, and B. Rajani. "Correction to: Study on Recent Method of Dynamic Time-Based Encryption (DTBE) and Searchable Access Control Scheme for Personal Health Record in Cloud Computing." In Cybernetics, Cognition and Machine Learning Applications. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Time based access control"

1

Leahu, Marius, Marc Dobson, and Giuseppe Avolio. "Role Based Access Control in the ATLAS Experiment." In 2007 15th IEEE-NPSS Real-Time Conference. IEEE, 2007. http://dx.doi.org/10.1109/rtc.2007.4382738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bertolissi, Clara, and Maribel Fernandez. "Time and Location Based Services with Access Control." In 2008 New Technologies, Mobility and Security (NTMS). IEEE, 2008. http://dx.doi.org/10.1109/ntms.2008.ecp.98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guang-liang Liu, Xin-you Li, Sheng-xian Xie, Hong-bin Luo, Jun-qing Li, and Yu-ting Wang. "Multi-granularity time-constraint Role-based access control." In 2008 IEEE International Symposium on IT in Medicine and Education (ITME). IEEE, 2008. http://dx.doi.org/10.1109/itme.2008.4744025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Real Time Access Control Based on Face Recognition." In International Academy of Engineers. International Academy of Engineers, 2015. http://dx.doi.org/10.15242/iae.iae0615004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hung, Le Xuan, Sungyoung Lee, Young-Koo Lee, and Heejo Lee. "Activity-based Access Control Model to Hospital Information." In 2007 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE, 2007. http://dx.doi.org/10.1109/rtcsa.2007.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ramanathan, Narayanan, Allison Beach, Robert Hastings, et al. "Virtual Inductive Loop: Real time video analytics for vehicular access control." In 2021 17th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, 2021. http://dx.doi.org/10.1109/avss52988.2021.9663748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Zhenghong, Yuhong Jia, and Tieli Sun. "Study on Role-Based Access Control with Time Constraint." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Hyoseung, Pratyush Patel, Shige Wang, and Ragunathan Raj Rajkumar. "A server-based approach for predictable GPU access control." In 2017 IEEE 23rd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). IEEE, 2017. http://dx.doi.org/10.1109/rtcsa.2017.8046309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sodiya, Adesina, and Adebukola Onashoga. "Components- Based Access Control Architecture." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3374.

Full text
Abstract:
Ensuring adequate security of information has been a growing concern of individuals and organizations. There is then the need to provide suitable access control mechanism for preventing insider abuses and ensuring appropriate use of resources. This paper presents an access control scheme that adopts the techniques of Role-Based Access Control (RBAC), Purpose-Based Access Control (PBAC), Time-Based Access Control (TBAC) and History-Based Access Control (HBAC) as components to form an integrated Components-based Access Control Architecture (CACA). In CACA, an Access Control Score (ACS) is comput
APA, Harvard, Vancouver, ISO, and other styles
10

Blower, Andrew, and Gerald Kotonya. "RECON: A Real-time Entity Based Access Control for IoT." In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). IEEE, 2019. http://dx.doi.org/10.1109/iotsms48152.2019.8939218.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Time based access control"

1

Bobashev, Georgiy, John Holloway, Eric Solano, and Boris Gutkin. A Control Theory Model of Smoking. RTI Press, 2017. http://dx.doi.org/10.3768/rtipress.2017.op.0040.1706.

Full text
Abstract:
We present a heuristic control theory model that describes smoking under restricted and unrestricted access to cigarettes. The model is based on the allostasis theory and uses a formal representation of a multiscale opponent process. The model simulates smoking behavior of an individual and produces both short-term (“loading up” after not smoking for a while) and long-term smoking patterns (e.g., gradual transition from a few cigarettes to one pack a day). By introducing a formal representation of withdrawal- and craving-like processes, the model produces gradual increases over time in withdra
APA, Harvard, Vancouver, ISO, and other styles
2

Jansen, W. A. A revised model for role-based access control. National Institute of Standards and Technology, 1998. http://dx.doi.org/10.6028/nist.ir.6192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Van de Sompel, H., M. Nelson, and R. Sanderson. HTTP Framework for Time-Based Access to Resource States -- Memento. RFC Editor, 2013. http://dx.doi.org/10.17487/rfc7089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chandramouli, Ramaswamy, Zack Butcher, and Aradhna Chetal. Attribute-based Access Control for Microservices-based Applications Using a Service Mesh. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.sp.800-204b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Freudenthal, Eric, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti. DRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada440599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hu, Vincent C., David Ferraiolo, Rick Kuhn, et al. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. National Institute of Standards and Technology, 2014. http://dx.doi.org/10.6028/nist.sp.800-162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yan, Lok K. Hardware Based Function Level Mandatory Access Control for Memory Structures. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada481104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Klasky, Hilda B., Sashi Tadinada, Paul T. Williams, and Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1093096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hengartner, Urs, and Peter Steenkiste. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada457869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wijnen, B., R. Presuhn, and K. McCloghrie. View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!