Academic literature on the topic 'Time based access control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Time based access control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Time based access control"
Han, Chun Yan, Lian Zhong Liu, and Yi Fei Yuan. "Time Constraints of Access Control." Applied Mechanics and Materials 602-605 (August 2014): 3791–95. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3791.
Full textLiu, Chaoqun, Zhen Peng, and Lili Wu. "Role of Time-Domain Based Access Control Model." Journal of Software Engineering and Applications 09, no. 02 (2016): 57–62. http://dx.doi.org/10.4236/jsea.2016.92004.
Full textSuchendra, Devie Ryana, Dewi Putri Suryani, and Muhammad Ikhsan Sani. "Home Lighting Control Based on Time Scheduling using Crontab." IJAIT (International Journal of Applied Information Technology) 2, no. 01 (2018): 1. http://dx.doi.org/10.25124/ijait.v2i01.924.
Full textMa, Haifeng, and Yangmin Li. "Multi-Power Reaching Law Based Discrete-Time Sliding-Mode Control." IEEE Access 7 (2019): 49822–29. http://dx.doi.org/10.1109/access.2019.2904103.
Full textZhang, Lili, Qi Zhao, Li Wang, and Lingyu Zhang. "Urban Intersection Signal Control Based on Time-Space Resource Scheduling." IEEE Access 9 (2021): 49281–91. http://dx.doi.org/10.1109/access.2021.3059496.
Full textDanilescu, Marcel, and Victor Besliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII, no. 2 (2021): 67–78. http://dx.doi.org/10.52326/jes.utm.2021.28(2).05.
Full textLuo, Yiping, and Junling Zhu. "Finite-Time Average Consensus Control of Multi-Agent Systems Based on the Aperiodically Intermittent Control." IEEE Access 10 (2022): 14959–68. http://dx.doi.org/10.1109/access.2022.3149278.
Full textDuan, Gui-Jiang, and Xin Yan. "A Real-Time Quality Control System Based on Manufacturing Process Data." IEEE Access 8 (2020): 208506–17. http://dx.doi.org/10.1109/access.2020.3038394.
Full textGuo, Jie, Zhanshan Zhao, Fengdong Shi, Ruikun Wang, and Shasha Li. "Observer-Based Synchronization Control for Coronary Artery Time-Delay Chaotic System." IEEE Access 7 (2019): 51222–35. http://dx.doi.org/10.1109/access.2019.2909749.
Full textAznar-Poveda, Juan, Esteban Egea-Lopez, Antonio-Javier Garcia-Sanchez, and Pablo Pavon-Marino. "Time-to-Collision-Based Awareness and Congestion Control for Vehicular Communications." IEEE Access 7 (2019): 154192–208. http://dx.doi.org/10.1109/access.2019.2949131.
Full textDissertations / Theses on the topic "Time based access control"
Jaggi, Felix P. "An access control model based on time and events." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28945.
Full textAlsarhani, Sami. "Reasoning about history based access control policy using past time operators of interval temporal logic." Thesis, De Montfort University, 2014. http://hdl.handle.net/2086/10406.
Full textKnight, G. S. "Scenario-based access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.
Full textAktoudianakis, Evangelos. "Relationship based access control." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/809642/.
Full textMagnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.
Full textKlöck, Clemens. "Auction-based Medium Access Control." [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000007323.
Full textMacfie, Alex. "Semantic role-based access control." Thesis, University of Westminster, 2014. https://westminsterresearch.westminster.ac.uk/item/964y2/semantic-role-based-access-control.
Full textBelokosztolszki, András. "Role-based access control policy administration." Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.615798.
Full textPang, Kenneth K. (Kenneth Kwok Kit) 1976. "Fine-grained event-based access control." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47532.
Full textMontrieux, Lionel. "Model-based analysis of role-based access control." Thesis, Open University, 2013. http://oro.open.ac.uk/38672/.
Full textBooks on the topic "Time based access control"
Yuen, Clement. Rate control with pricing in contention-based access networks. National Library of Canada, 2002.
Find full textKogan, Konstantin, and Eugene Khmelnitsky. Scheduling: Control-Based Theory and Polynomial-Time Algorithms. Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4675-7.
Full textKogan, Konstantin. Scheduling: Control-based theory and polynomial-time algorithms. Kluwer Academic Publishers, 2000.
Find full textHendrick, Thomas E. Purchasing's contributions to time-based strategies. Center for Advanced Purchasing Studies, 1994.
Find full textLarson, Richard R. A rule-based system for real-time analysis of control systems. National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Find full textLarson, Richard R. A rule-based system for real-time analysis of control systems. National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Find full textLarson, Richard R. A rule-based system for real-time analysis of control systems. National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Find full textBook chapters on the topic "Time based access control"
Limkar, Suresh, Nivedita Kadam, and Rakesh Kumar Jha. "Access Control Based on Location and Time." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32573-1_16.
Full textChiang, Chia-Chu, and Coskun Bayrak. "Concurrency and Time in Role-Based Access Control." In Advances in Information Security and Its Application. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02633-1_5.
Full textZou, Lei, Zidong Wang, and Jinling Liang. "Recursive Filtering for Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_6.
Full textZou, Lei, Zidong Wang, and Jinling Liang. "Observer-Based $${\mathscr {H}}_{\infty }$$ Control of Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_8.
Full textZou, Lei, Zidong Wang, and Jinling Liang. "Finite-Horizon $${\mathscr {H}}_{\infty }$$ Fault Estimation of Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_4.
Full textYuan, Zhiyong, Changcheng Zhou, Yiqing Lian, Qingshan Xu, and Siyu Tao. "Multi-point Access Decentralized Wind Power Time Series Model Based on MCMC Algorithm and Hierarchical Clustering Algorithm." In Proceedings of PURPLE MOUNTAIN FORUM 2019-International Forum on Smart Grid Protection and Control. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9783-7_31.
Full textZhang, Jiawei, Yanbo Yang, Ning Lu, Zhiwei Liu, and Jianfeng Ma. "A Privacy-Aware and Time-Limited Data Access Control Scheme with Large Universe and Public Traceability for Cloud-Based IoD." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96791-8_8.
Full textJyothi, E. V. N., V. Purna Chandra Rao, and B. Rajani. "Study on Recent Method of Dynamic Time-Based Encryption (DTBE) and Searchable Access Control Scheme for Personal Health Record in Cloud Computing." In Cybernetics, Cognition and Machine Learning Applications. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_28.
Full textZhao, Yujuan, Baojiang Cui, and Jie Xu. "A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain." In Communications in Computer and Information Science. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9229-1_2.
Full textJyothi, E. V. N., V. Purna Chandra Rao, and B. Rajani. "Correction to: Study on Recent Method of Dynamic Time-Based Encryption (DTBE) and Searchable Access Control Scheme for Personal Health Record in Cloud Computing." In Cybernetics, Cognition and Machine Learning Applications. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_33.
Full textConference papers on the topic "Time based access control"
Leahu, Marius, Marc Dobson, and Giuseppe Avolio. "Role Based Access Control in the ATLAS Experiment." In 2007 15th IEEE-NPSS Real-Time Conference. IEEE, 2007. http://dx.doi.org/10.1109/rtc.2007.4382738.
Full textBertolissi, Clara, and Maribel Fernandez. "Time and Location Based Services with Access Control." In 2008 New Technologies, Mobility and Security (NTMS). IEEE, 2008. http://dx.doi.org/10.1109/ntms.2008.ecp.98.
Full textGuang-liang Liu, Xin-you Li, Sheng-xian Xie, Hong-bin Luo, Jun-qing Li, and Yu-ting Wang. "Multi-granularity time-constraint Role-based access control." In 2008 IEEE International Symposium on IT in Medicine and Education (ITME). IEEE, 2008. http://dx.doi.org/10.1109/itme.2008.4744025.
Full text"Real Time Access Control Based on Face Recognition." In International Academy of Engineers. International Academy of Engineers, 2015. http://dx.doi.org/10.15242/iae.iae0615004.
Full textHung, Le Xuan, Sungyoung Lee, Young-Koo Lee, and Heejo Lee. "Activity-based Access Control Model to Hospital Information." In 2007 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE, 2007. http://dx.doi.org/10.1109/rtcsa.2007.18.
Full textRamanathan, Narayanan, Allison Beach, Robert Hastings, et al. "Virtual Inductive Loop: Real time video analytics for vehicular access control." In 2021 17th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, 2021. http://dx.doi.org/10.1109/avss52988.2021.9663748.
Full textLiu, Zhenghong, Yuhong Jia, and Tieli Sun. "Study on Role-Based Access Control with Time Constraint." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.232.
Full textKim, Hyoseung, Pratyush Patel, Shige Wang, and Ragunathan Raj Rajkumar. "A server-based approach for predictable GPU access control." In 2017 IEEE 23rd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). IEEE, 2017. http://dx.doi.org/10.1109/rtcsa.2017.8046309.
Full textSodiya, Adesina, and Adebukola Onashoga. "Components- Based Access Control Architecture." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3374.
Full textBlower, Andrew, and Gerald Kotonya. "RECON: A Real-time Entity Based Access Control for IoT." In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). IEEE, 2019. http://dx.doi.org/10.1109/iotsms48152.2019.8939218.
Full textReports on the topic "Time based access control"
Bobashev, Georgiy, John Holloway, Eric Solano, and Boris Gutkin. A Control Theory Model of Smoking. RTI Press, 2017. http://dx.doi.org/10.3768/rtipress.2017.op.0040.1706.
Full textJansen, W. A. A revised model for role-based access control. National Institute of Standards and Technology, 1998. http://dx.doi.org/10.6028/nist.ir.6192.
Full textVan de Sompel, H., M. Nelson, and R. Sanderson. HTTP Framework for Time-Based Access to Resource States -- Memento. RFC Editor, 2013. http://dx.doi.org/10.17487/rfc7089.
Full textChandramouli, Ramaswamy, Zack Butcher, and Aradhna Chetal. Attribute-based Access Control for Microservices-based Applications Using a Service Mesh. National Institute of Standards and Technology, 2021. http://dx.doi.org/10.6028/nist.sp.800-204b.
Full textFreudenthal, Eric, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti. DRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada440599.
Full textHu, Vincent C., David Ferraiolo, Rick Kuhn, et al. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. National Institute of Standards and Technology, 2014. http://dx.doi.org/10.6028/nist.sp.800-162.
Full textYan, Lok K. Hardware Based Function Level Mandatory Access Control for Memory Structures. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada481104.
Full textKlasky, Hilda B., Sashi Tadinada, Paul T. Williams, and Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1093096.
Full textHengartner, Urs, and Peter Steenkiste. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada457869.
Full textWijnen, B., R. Presuhn, and K. McCloghrie. View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC Editor, 2002. http://dx.doi.org/10.17487/rfc3415.
Full text