Academic literature on the topic 'User Access Control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'User Access Control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "User Access Control"
Jawed Khan, Aakib, and Shabana Mehfuz. "Fuzzy User Access Trust Model for Cloud Access Control." Computer Systems Science and Engineering 44, no. 1 (2023): 113–28. http://dx.doi.org/10.32604/csse.2023.023378.
Full textDanilescu, Marcel. "MODELING ACCESS CONTROL AND USER ACTIONS USING TRUST - BASED ACCESS CONTROL POLICIES." Journal of Social Sciences III (3) (September 1, 2020): 72–84. https://doi.org/10.5281/zenodo.3971967.
Full textKim, Dongmin, and Heeyoul Kim. "User-Centric Access Control for Android Platform." Journal of Korean Institute of Information Technology 13, no. 5 (2015): 49. http://dx.doi.org/10.14801/jkiit.2015.13.5.49.
Full textHarn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.
Full textKumar, Devender, Sai Kishore Pachigolla, Shubham Singh Manhas, and Karan Rawat. "PUF-based user access control scheme for IoT environment." Journal of Information and Optimization Sciences 44, no. 7 (2023): 1347–64. http://dx.doi.org/10.47974/jios-1321.
Full textRussell, D. "Access Control Techniques and Their Impact on User Accessibility in Computer Networks." SIJ Transactions on Computer Networks & Communication Engineering 7, no. 5 (2019): 16–19. http://dx.doi.org/10.9756/sijcnce/v7i5/07051014.
Full textWang, Haodong, and Qun Li. "Achieving distributed user access control in sensor networks." Ad Hoc Networks 10, no. 3 (2012): 272–83. http://dx.doi.org/10.1016/j.adhoc.2011.01.011.
Full textWang, Huaxia, Yu-Dong Yao, Xin Zhang, and Hongbin Li. "Secondary User Access Control in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 34, no. 11 (2016): 2866–73. http://dx.doi.org/10.1109/jsac.2016.2615262.
Full textDanilescu, Marcel, and Victor Beșliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII (2) (June 16, 2021): 67–78. https://doi.org/10.52326/jes.utm.2021.28(2).05.
Full textLi, Zhiyuan, Li Chen, and Weidong Wang. "Stochastic Downlink Power Control for Various User Requirements." IEEE Access 8 (2020): 8899–912. http://dx.doi.org/10.1109/access.2019.2963196.
Full textDissertations / Theses on the topic "User Access Control"
Jiangcheng, Qin. "User Behavior Trust Based Cloud Computing Access Control Model." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12708.
Full textQiu, Wei. "Exploring user-to-role delegation in role-based access control." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27411.
Full textWang, Frank Yi-Fei. "Cryptographically enforced access control for user data in untrusted clouds." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/103669.
Full textLow, Marie Rose. "Self defence in open systems : protecting and sharing resources in a distributed open environment." Thesis, University of Hertfordshire, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241623.
Full textChuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.
Full textShaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.
Full textBeattie, Diane Lynn. "The informational needs of historians researching women : an archival user study." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26047.
Full textBhamidipati, Venkata Ramana Murthy. "Architectures and models for administration of user-role assignment in role based access control." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3357.
Full textMaw, Htoo Aung. "A trust-based adaptive access control model for wireless sensor networks." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16564.
Full textDeas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.
Full textBooks on the topic "User Access Control"
Jasper, Kim. User access & information protection: Managing open access & information protection. PROJECT CONSULT, 2002.
Find full textHelme, Arne. A system for secure user-controlled electronic transactions. Shaker Publishing, 1997.
Find full textTodorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.
Find full textRodrigues, Charmaine. Karnataka Right to Information Act, 2000: A user guide. Edited by Muralidharan Y. G, Daruwala Maja, Nayak Venkatesh, Commonwealth Human Rights Initiative, Consumer Rights Education & Awareness Trust (Bangalore, India), and Karnataka (India). Commonwealth Human Rights Initiative, 2005.
Find full textParker, Philip M. The 2009-2014 world outlook for user account provisioning technologies. Icon Group International, 2008.
Find full textConference, Uniwersytet Jagielloński Instytut Bibliotekoznawstwa i. Informacji Naukowej International. Użytkownicy informacji elektronicznej. Wydawn. Uniwersytetu Jagiellońskiego, 2000.
Find full textUnited States. Congress. House. Committee on Ways and Means. Subcommittee on Trade and United States. Congress. Senate. Committee on Finance, eds. Customs service: Passenger user fee collection needs to be reevaluated : report to the Committee on Finance, U.S. Senate, and Subcommittee on Trade, Committee on Ways and Means, House of Representatives. The Office, 1995.
Find full textHeld, Gilbert. Netware login scripts: The productivity tool for administrators and users. McGraw-Hill, 1996.
Find full textJohnson, Maritza Lupe. Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings. [publisher not identified], 2012.
Find full textBook chapters on the topic "User Access Control"
Mahalle, Parikshit N., Shashikant S. Bhong, and Gitanjali R. Shinde. "User-Managed Access." In Authorization and Access Control. CRC Press, 2022. http://dx.doi.org/10.1201/9781003268482-4.
Full textSánchez, M., B. Jiménez, F. L. Gutièrrez, P. Paderewski, and J. L. Isla. "Access Control Model for Collaborative Business Processes." In Engineering the User Interface. Springer London, 2008. http://dx.doi.org/10.1007/978-1-84800-136-7_9.
Full textAmor, Selma Belhadj, and Samir M. Perlaza. "Decentralized K-User Gaussian Multiple Access Channels." In Network Games, Control, and Optimization. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-51034-7_5.
Full textWang, Haodong, and Qun Li. "Distributed User Access Control in Sensor Networks." In Distributed Computing in Sensor Systems. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11776178_19.
Full textShehab, Mohamed, Anna Cinzia Squicciarini, and Gail-Joon Ahn. "Beyond User-to-User Access Control for Online Social Networks." In Information and Communications Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88625-9_12.
Full textLiu, Xiaofan, Natasha Alechina, and Brian Logan. "Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38033-4_17.
Full textChinaei, Amir H., and Frank Wm Tompa. "User-Managed Access Control for Health Care Systems." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11552338_5.
Full textPlanas, Elena, Salvador Martínez, Marco Brambilla, and Jordi Cabot. "Towards Access Control Models for Conversational User Interfaces." In Enterprise, Business-Process and Information Systems Modeling. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07475-2_21.
Full textSobieski, Ścibor, and Bartosz Zieliński. "User Stories and Parameterized Role Based Access Control." In Model and Data Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23781-7_25.
Full textGonzález-Manzano, Lorena, Ana I. González-Tablas, José M. de Fuentes, and Arturo Ribagorda. "User-Managed Access Control in Web Based Social Networks." In Lecture Notes in Social Networks. Springer Vienna, 2013. http://dx.doi.org/10.1007/978-3-7091-0894-9_4.
Full textConference papers on the topic "User Access Control"
Cao, Kai, and Zhe Wang. "Fine-Grained Access Control System for Multi-User Environments." In 2024 4th International Signal Processing, Communications and Engineering Management Conference (ISPCEM). IEEE, 2024. https://doi.org/10.1109/ispcem64498.2024.00096.
Full textWang, Xiao, Yunchuan Guo, Mingjie Yu, Ziyan Zhou, Liang Fang, and Fenghua Li. "Custominer: Mining Customized Access Control Policies under User-Defined Constraints." In 2024 IEEE International Conference on High Performance Computing and Communications (HPCC). IEEE, 2024. https://doi.org/10.1109/hpcc64274.2024.00191.
Full textSu, Linying. "User Behaviour Based Access Control Decision." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.349.
Full textXudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, and Dong Xuan. "DiffUser: Differentiated user access control on smartphones." In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, 2009. http://dx.doi.org/10.1109/mobhoc.2009.5337017.
Full textXu, Fei, Jingsha He, Xu Wu, and Jing Xu. "A User-Centric Privacy Access Control Model." In 2010 2nd International Symposium on Information Engineering and Electronic Commerce (IEEC). IEEE, 2010. http://dx.doi.org/10.1109/ieec.2010.5533251.
Full textWhalen, Tara, Diana Smetters, and Elizabeth F. Churchill. "User experiences with sharing and access control." In CHI '06 extended abstracts. ACM Press, 2006. http://dx.doi.org/10.1145/1125451.1125729.
Full textYang-Yang Li, Leon Yen, and Elvino S. Sousa. "Hybrid user access control in HSDPA femtocells." In 2010 IEEE Globecom Workshops (GC'10). IEEE, 2010. http://dx.doi.org/10.1109/glocomw.2010.5700407.
Full textThomas, Jacques, Federica Paci, Elisa Bertino, and Patrick Eugster. "User Tasks and Access Control overWeb Services." In IEEE International Conference on Web Services (ICWS 2007). IEEE, 2007. http://dx.doi.org/10.1109/icws.2007.182.
Full textZhu, Rui, Changguo Guo, Huaimin Wang, and Hailin Gong. "A User Trustworthiness Based Lightweight Access Control." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.432.
Full textStavrakakis, I., and D. Kazakos. "A non-homogeneous user population multi-user random access communication system." In 26th IEEE Conference on Decision and Control. IEEE, 1987. http://dx.doi.org/10.1109/cdc.1987.272461.
Full textReports on the topic "User Access Control"
Long, A. C., Courtney Moskowitz, and Greg Ganger. A Prototype User Interface for Coarse-Grained Desktop Access Control. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada488514.
Full textNarayan, K., and D. Nelson. Using Authentication, Authorization, and Accounting Services to Dynamically Provision View-Based Access Control Model User-to-Group Mappings. Edited by R. Presuhn. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6065.
Full textBrown, Dustin, Matthew Hiett, Samantha Cook, Dylan Pasley, Melissa Pham, and Sandra LeGrand. Rotorcraft Resupply Site Selection (RRSS) v1.0 and the USACE Model Interface Platform (UMIP) : documentation and user’s guide. Engineer Research and Development Center (U.S.), 2023. http://dx.doi.org/10.21079/11681/47908.
Full textBaena Olabe, Paloma, and Juan Cruz Vieyra. Access to Information and Targeted Transparency Policies. Inter-American Development Bank, 2011. http://dx.doi.org/10.18235/0009022.
Full textCrooks, Roderic. Toward People’s Community Control of Technology: Race, Access, and Education. Social Science Research Council, 2022. http://dx.doi.org/10.35650/jt.3015.d.2022.
Full textZeilenga, K. The Lightweight Directory Access Protocol (LDAP) Don't Use Copy Control. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6171.
Full textAdair, Mike, and OGC Portal Admin. Access Control and Terms of Use (ToU) "Click-through" IPR Management. Open Geospatial Consortium, Inc., 2006. http://dx.doi.org/10.62973/05-111r2.
Full textMacGregor, W. I., K. Mehta, D. A. Cooper, and K. A. Scarfone. A recommendation for the use of PIV credentials in Physical Access Control Systems (PACS). National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-116.
Full textPoole, Joseph, John Barkley, Kevin Brady, Anthony Cincotta, and Wayne Salamon. Distributed communication methods and role-based access control for use in health care applications. National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.ir.5820.
Full textEslava, Marcela, Alessandro Maffioli, and Marcela Meléndez Arjona. Second-tier Government Banks and Access to Credit: Micro-Evidence from Colombia. Inter-American Development Bank, 2012. http://dx.doi.org/10.18235/0011364.
Full text