Academic literature on the topic 'User Access Control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'User Access Control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "User Access Control"

1

Jawed Khan, Aakib, and Shabana Mehfuz. "Fuzzy User Access Trust Model for Cloud Access Control." Computer Systems Science and Engineering 44, no. 1 (2023): 113–28. http://dx.doi.org/10.32604/csse.2023.023378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Danilescu, Marcel. "MODELING ACCESS CONTROL AND USER ACTIONS USING TRUST - BASED ACCESS CONTROL POLICIES." Journal of Social Sciences III (3) (September 1, 2020): 72–84. https://doi.org/10.5281/zenodo.3971967.

Full text
Abstract:
This paper is a natural continuation of previous research on the implementation of confidentiality in small, medium, and virtual enterprises. This research began in 2009, with the work "Xml Based Techniques for Data Privacy in E-Business" which revealed that for small, medium, and virtual enterprises that often represent start-ups, trust is a basic element. Thus, in 2010, we published the paper "Control access to information by applying policies based on trust hierarchies". Present work shows a method of modeling the hierarchies of trust in computer systems. After a review
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Dongmin, and Heeyoul Kim. "User-Centric Access Control for Android Platform." Journal of Korean Institute of Information Technology 13, no. 5 (2015): 49. http://dx.doi.org/10.14801/jkiit.2015.13.5.49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Harn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kumar, Devender, Sai Kishore Pachigolla, Shubham Singh Manhas, and Karan Rawat. "PUF-based user access control scheme for IoT environment." Journal of Information and Optimization Sciences 44, no. 7 (2023): 1347–64. http://dx.doi.org/10.47974/jios-1321.

Full text
Abstract:
A very important part of any software or hardware associated with the Internet of Things (IoT) is the User Access Control. User Access Control deals with the important security features like authenticating a legitimate user, authorizing a user, etc. A very effective and secure way to ensure the user access control is: three factor user access control. Some three factor user authentication schemes have been developed in the past, brief details regarding them can be found in further sections of the paper. In this paper, we propose a new three factor user access control scheme. Our proposed schem
APA, Harvard, Vancouver, ISO, and other styles
6

Russell, D. "Access Control Techniques and Their Impact on User Accessibility in Computer Networks." SIJ Transactions on Computer Networks & Communication Engineering 7, no. 5 (2019): 16–19. http://dx.doi.org/10.9756/sijcnce/v7i5/07051014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Haodong, and Qun Li. "Achieving distributed user access control in sensor networks." Ad Hoc Networks 10, no. 3 (2012): 272–83. http://dx.doi.org/10.1016/j.adhoc.2011.01.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Huaxia, Yu-Dong Yao, Xin Zhang, and Hongbin Li. "Secondary User Access Control in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 34, no. 11 (2016): 2866–73. http://dx.doi.org/10.1109/jsac.2016.2615262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Danilescu, Marcel, and Victor Beșliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII (2) (June 16, 2021): 67–78. https://doi.org/10.52326/jes.utm.2021.28(2).05.

Full text
Abstract:
In recent decades, the number of researches on access control and user actions in computer systems has increased. Over time, there have been two models of implementing Mandatory Access Control (MAC) policies for government institutions and Discretionary Access Control (DAC) for the business environment, policies that various access control modeling solutions seek to implement. Among the access control modeling solutions developed are Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), presented in the U.S.A. by the National Institute of Standard and Technology (NIST). I
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Zhiyuan, Li Chen, and Weidong Wang. "Stochastic Downlink Power Control for Various User Requirements." IEEE Access 8 (2020): 8899–912. http://dx.doi.org/10.1109/access.2019.2963196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "User Access Control"

1

Jiangcheng, Qin. "User Behavior Trust Based Cloud Computing Access Control Model." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12708.

Full text
Abstract:
Context. With the development of computer software, hardware, and communication technologies, a new type of human-centered computing model, called Cloud Computing (CC) has been established as a commercial computer network service. However, the openness of CC brings huge security challenge to the identity-based access control system, as it not able to effectively prevent malicious users accessing; information security problems, system stability problems, and also the trust issues between cloud service users (CSUs) and cloud service providers (CSPs) are arising therefrom. User behavior trust (UB
APA, Harvard, Vancouver, ISO, and other styles
2

Qiu, Wei. "Exploring user-to-role delegation in role-based access control." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27411.

Full text
Abstract:
Mechanisms must be provided to protect resources from attackers when users request access to resources in network environments. Role-Based Access Control (RBAC) formulates that access decisions are based on the roles that individual users have as members of a system. In RBAC, there are role hierarchies in which a senior role inherits the permissions of a junior role. In order to allow a junior role to perform one or more tasks of a senior role, various delegation models have been proposed in the literature, including Role-Based Access Control Model (RBAC96), Role-Based Delegation Model (RBDM0)
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Frank Yi-Fei. "Cryptographically enforced access control for user data in untrusted clouds." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/103669.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 55-60).<br>Modern web services rob users of low-level control over cloud storage; a user's single logical data set is scattered across multiple storage silos whose access controls are set by the web services, not users. The res
APA, Harvard, Vancouver, ISO, and other styles
4

Low, Marie Rose. "Self defence in open systems : protecting and sharing resources in a distributed open environment." Thesis, University of Hertfordshire, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.

Full text
Abstract:
Whitelisting IP addresses and hostnames allow organizations to employ a default-deny approach to network traffic. Organizations employing a default-deny approach can stop many malicious threats, even including zero-day attacks, because it only allows explicitly stated legitimate activities. However, creating a comprehensive whitelist for a default-deny approach is difficult due to user-supplied destinations that can only be known at the time of usage. Whitelists, therefore, interfere with user experience by denying network traffic to user-supplied legitimate destinations. In this thesis, we fo
APA, Harvard, Vancouver, ISO, and other styles
6

Shaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.

Full text
Abstract:
The primary focus of this research is an examination of the issues involved in the granting of access in an environment characterised by multiple users, multiple resources and multiple levels of access permission. Increasing levels of complexity in automotive systems provides opportunities for improving the integration and efficiency of the services provided to the operator. The vehicle lease / hire environment provided a basis for evaluating conditional access to distributed, mobile assets where the principal medium for operating in this environment is the Smart Card. The application of Smart
APA, Harvard, Vancouver, ISO, and other styles
7

Beattie, Diane Lynn. "The informational needs of historians researching women : an archival user study." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26047.

Full text
Abstract:
This thesis examines the informational needs of historians researching women as a subject in archives. The research methodology employed combines two types of user studies, the questionnaire and the reference analysis, in order to determine both the use and usefulness of archival materials and finding aids for historians researching women. This study begins with an overview of the literature on user studies. The thesis then outlines both the kinds of materials and the information historians researching women require. Finally, this study looks at the way historians researching women locate rele
APA, Harvard, Vancouver, ISO, and other styles
8

Bhamidipati, Venkata Ramana Murthy. "Architectures and models for administration of user-role assignment in role based access control." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3357.

Full text
Abstract:
Thesis (Ph.D.)--George Mason University, 2008.<br>Vita: p. 99. Thesis directors: Ravi Sandhu, Daniel Menascé. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed Jan. 8, 2009). Includes bibliographical references (p. 94-98). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
9

Maw, Htoo Aung. "A trust-based adaptive access control model for wireless sensor networks." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16564.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. One emerging application for WSNs involves their use in healthcare where they are generally termed Wireless Medical Sensor Networks (WMSNs). In a hospital, fitting patients with tiny, wearable, wireless vital sign sensors would allow doctors, nurses and others to continuously monitor the state of those in their care. In the healthcare industry, patients are expected to be treated in reasonable time and any loss in data availability can result in further d
APA, Harvard, Vancouver, ISO, and other styles
10

Deas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.

Full text
Abstract:
Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering tech
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "User Access Control"

1

Corporation, Quarterdeck. Procomm RapidRemote: User guide. Quarterdeck, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jasper, Kim. User access & information protection: Managing open access & information protection. PROJECT CONSULT, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Helme, Arne. A system for secure user-controlled electronic transactions. Shaker Publishing, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Todorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rodrigues, Charmaine. Karnataka Right to Information Act, 2000: A user guide. Edited by Muralidharan Y. G, Daruwala Maja, Nayak Venkatesh, Commonwealth Human Rights Initiative, Consumer Rights Education & Awareness Trust (Bangalore, India), and Karnataka (India). Commonwealth Human Rights Initiative, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Parker, Philip M. The 2009-2014 world outlook for user account provisioning technologies. Icon Group International, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Conference, Uniwersytet Jagielloński Instytut Bibliotekoznawstwa i. Informacji Naukowej International. Użytkownicy informacji elektronicznej. Wydawn. Uniwersytetu Jagiellońskiego, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. House. Committee on Ways and Means. Subcommittee on Trade and United States. Congress. Senate. Committee on Finance, eds. Customs service: Passenger user fee collection needs to be reevaluated : report to the Committee on Finance, U.S. Senate, and Subcommittee on Trade, Committee on Ways and Means, House of Representatives. The Office, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Held, Gilbert. Netware login scripts: The productivity tool for administrators and users. McGraw-Hill, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Johnson, Maritza Lupe. Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings. [publisher not identified], 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "User Access Control"

1

Mahalle, Parikshit N., Shashikant S. Bhong, and Gitanjali R. Shinde. "User-Managed Access." In Authorization and Access Control. CRC Press, 2022. http://dx.doi.org/10.1201/9781003268482-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sánchez, M., B. Jiménez, F. L. Gutièrrez, P. Paderewski, and J. L. Isla. "Access Control Model for Collaborative Business Processes." In Engineering the User Interface. Springer London, 2008. http://dx.doi.org/10.1007/978-1-84800-136-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Amor, Selma Belhadj, and Samir M. Perlaza. "Decentralized K-User Gaussian Multiple Access Channels." In Network Games, Control, and Optimization. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-51034-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Haodong, and Qun Li. "Distributed User Access Control in Sensor Networks." In Distributed Computing in Sensor Systems. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11776178_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shehab, Mohamed, Anna Cinzia Squicciarini, and Gail-Joon Ahn. "Beyond User-to-User Access Control for Online Social Networks." In Information and Communications Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88625-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Xiaofan, Natasha Alechina, and Brian Logan. "Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38033-4_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chinaei, Amir H., and Frank Wm Tompa. "User-Managed Access Control for Health Care Systems." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11552338_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Planas, Elena, Salvador Martínez, Marco Brambilla, and Jordi Cabot. "Towards Access Control Models for Conversational User Interfaces." In Enterprise, Business-Process and Information Systems Modeling. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07475-2_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sobieski, Ścibor, and Bartosz Zieliński. "User Stories and Parameterized Role Based Access Control." In Model and Data Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23781-7_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

González-Manzano, Lorena, Ana I. González-Tablas, José M. de Fuentes, and Arturo Ribagorda. "User-Managed Access Control in Web Based Social Networks." In Lecture Notes in Social Networks. Springer Vienna, 2013. http://dx.doi.org/10.1007/978-3-7091-0894-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "User Access Control"

1

Cao, Kai, and Zhe Wang. "Fine-Grained Access Control System for Multi-User Environments." In 2024 4th International Signal Processing, Communications and Engineering Management Conference (ISPCEM). IEEE, 2024. https://doi.org/10.1109/ispcem64498.2024.00096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Xiao, Yunchuan Guo, Mingjie Yu, Ziyan Zhou, Liang Fang, and Fenghua Li. "Custominer: Mining Customized Access Control Policies under User-Defined Constraints." In 2024 IEEE International Conference on High Performance Computing and Communications (HPCC). IEEE, 2024. https://doi.org/10.1109/hpcc64274.2024.00191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Su, Linying. "User Behaviour Based Access Control Decision." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Xudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, and Dong Xuan. "DiffUser: Differentiated user access control on smartphones." In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, 2009. http://dx.doi.org/10.1109/mobhoc.2009.5337017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xu, Fei, Jingsha He, Xu Wu, and Jing Xu. "A User-Centric Privacy Access Control Model." In 2010 2nd International Symposium on Information Engineering and Electronic Commerce (IEEC). IEEE, 2010. http://dx.doi.org/10.1109/ieec.2010.5533251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Whalen, Tara, Diana Smetters, and Elizabeth F. Churchill. "User experiences with sharing and access control." In CHI '06 extended abstracts. ACM Press, 2006. http://dx.doi.org/10.1145/1125451.1125729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yang-Yang Li, Leon Yen, and Elvino S. Sousa. "Hybrid user access control in HSDPA femtocells." In 2010 IEEE Globecom Workshops (GC'10). IEEE, 2010. http://dx.doi.org/10.1109/glocomw.2010.5700407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thomas, Jacques, Federica Paci, Elisa Bertino, and Patrick Eugster. "User Tasks and Access Control overWeb Services." In IEEE International Conference on Web Services (ICWS 2007). IEEE, 2007. http://dx.doi.org/10.1109/icws.2007.182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhu, Rui, Changguo Guo, Huaimin Wang, and Hailin Gong. "A User Trustworthiness Based Lightweight Access Control." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stavrakakis, I., and D. Kazakos. "A non-homogeneous user population multi-user random access communication system." In 26th IEEE Conference on Decision and Control. IEEE, 1987. http://dx.doi.org/10.1109/cdc.1987.272461.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "User Access Control"

1

Long, A. C., Courtney Moskowitz, and Greg Ganger. A Prototype User Interface for Coarse-Grained Desktop Access Control. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada488514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Narayan, K., and D. Nelson. Using Authentication, Authorization, and Accounting Services to Dynamically Provision View-Based Access Control Model User-to-Group Mappings. Edited by R. Presuhn. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brown, Dustin, Matthew Hiett, Samantha Cook, Dylan Pasley, Melissa Pham, and Sandra LeGrand. Rotorcraft Resupply Site Selection (RRSS) v1.0 and the USACE Model Interface Platform (UMIP) : documentation and user’s guide. Engineer Research and Development Center (U.S.), 2023. http://dx.doi.org/10.21079/11681/47908.

Full text
Abstract:
This research effort aimed to create an operational prototype of the Geomorphic Oscillation Assessment Tool (GOAT) v1.0, developed by the US Army Engineer Research and Development Center, as a part of the US Army Corps of Engineers’ Model Interface Platform (UMIP). This platform is a web-based software that allows for easy and rapid construction and deployment of spatial planning and analysis capabilities. The prototype tool in UMIP represents the science embedded in GOAT while providing a user-friendly interface for interaction and spatially referenced result viewing. It also includes user ac
APA, Harvard, Vancouver, ISO, and other styles
4

Baena Olabe, Paloma, and Juan Cruz Vieyra. Access to Information and Targeted Transparency Policies. Inter-American Development Bank, 2011. http://dx.doi.org/10.18235/0009022.

Full text
Abstract:
This paper contributes to the debate around why and how access to information can be used to prevent and control corruption. Access to information can not only bring corruption cases to light, it can also be a fundamental tool for its prevention and control, given that it encourages the creation of channels of participation and helps to identify vulnerabilities in both the public and the private sectors that might become windows of opportunity for corrupt practices. The paper`s conceptual framework explains how initiatives aimed at promoting access to information that are based on the concept
APA, Harvard, Vancouver, ISO, and other styles
5

Crooks, Roderic. Toward People’s Community Control of Technology: Race, Access, and Education. Social Science Research Council, 2022. http://dx.doi.org/10.35650/jt.3015.d.2022.

Full text
Abstract:
This field review explores how the benefits of access to computing for racialized and minoritized communities has become an accepted fact in policy and research, despite decades of evidence that technical fixes do not solve the kinds of complex social problems that disproportionately affect these communities. I use the digital divide framework—a 1990s policy diagnosis that argues that the growth and success of the internet would bifurcate the public into digital “haves” and “have-nots”—as a lens to look at why access to computing frequently appears as a means to achieve economic, political, an
APA, Harvard, Vancouver, ISO, and other styles
6

Zeilenga, K. The Lightweight Directory Access Protocol (LDAP) Don't Use Copy Control. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Adair, Mike, and OGC Portal Admin. Access Control and Terms of Use (ToU) "Click-through" IPR Management. Open Geospatial Consortium, Inc., 2006. http://dx.doi.org/10.62973/05-111r2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

MacGregor, W. I., K. Mehta, D. A. Cooper, and K. A. Scarfone. A recommendation for the use of PIV credentials in Physical Access Control Systems (PACS). National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Poole, Joseph, John Barkley, Kevin Brady, Anthony Cincotta, and Wayne Salamon. Distributed communication methods and role-based access control for use in health care applications. National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.ir.5820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Eslava, Marcela, Alessandro Maffioli, and Marcela Meléndez Arjona. Second-tier Government Banks and Access to Credit: Micro-Evidence from Colombia. Inter-American Development Bank, 2012. http://dx.doi.org/10.18235/0011364.

Full text
Abstract:
Government-owned development banks have often been justified by the need to respond to financial market imperfections that hinder the establishment and growth of promising businesses, and as a result, stifle economic development more generally. However, evidence on the effectiveness of these banks in mitigating financial constraints is still lacking. To fill this gap, this paper analyzes the impact of Bancoldex, Colombia's publicly owned development bank, on access to credit. It uses a unique dataset that contains key characteristics of all loans issued to businesses in Colombia, including the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!