Journal articles on the topic 'User Access Control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'User Access Control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jawed Khan, Aakib, and Shabana Mehfuz. "Fuzzy User Access Trust Model for Cloud Access Control." Computer Systems Science and Engineering 44, no. 1 (2023): 113–28. http://dx.doi.org/10.32604/csse.2023.023378.
Full textDanilescu, Marcel. "MODELING ACCESS CONTROL AND USER ACTIONS USING TRUST - BASED ACCESS CONTROL POLICIES." Journal of Social Sciences III (3) (September 1, 2020): 72–84. https://doi.org/10.5281/zenodo.3971967.
Full textKim, Dongmin, and Heeyoul Kim. "User-Centric Access Control for Android Platform." Journal of Korean Institute of Information Technology 13, no. 5 (2015): 49. http://dx.doi.org/10.14801/jkiit.2015.13.5.49.
Full textHarn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.
Full textKumar, Devender, Sai Kishore Pachigolla, Shubham Singh Manhas, and Karan Rawat. "PUF-based user access control scheme for IoT environment." Journal of Information and Optimization Sciences 44, no. 7 (2023): 1347–64. http://dx.doi.org/10.47974/jios-1321.
Full textRussell, D. "Access Control Techniques and Their Impact on User Accessibility in Computer Networks." SIJ Transactions on Computer Networks & Communication Engineering 7, no. 5 (2019): 16–19. http://dx.doi.org/10.9756/sijcnce/v7i5/07051014.
Full textWang, Haodong, and Qun Li. "Achieving distributed user access control in sensor networks." Ad Hoc Networks 10, no. 3 (2012): 272–83. http://dx.doi.org/10.1016/j.adhoc.2011.01.011.
Full textWang, Huaxia, Yu-Dong Yao, Xin Zhang, and Hongbin Li. "Secondary User Access Control in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 34, no. 11 (2016): 2866–73. http://dx.doi.org/10.1109/jsac.2016.2615262.
Full textDanilescu, Marcel, and Victor Beșliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII (2) (June 16, 2021): 67–78. https://doi.org/10.52326/jes.utm.2021.28(2).05.
Full textLi, Zhiyuan, Li Chen, and Weidong Wang. "Stochastic Downlink Power Control for Various User Requirements." IEEE Access 8 (2020): 8899–912. http://dx.doi.org/10.1109/access.2019.2963196.
Full textWang, Huaxia, Yu-Dong Yao, and Shengliang Peng. "Prioritized Secondary User Access Control in Cognitive Radio Networks." IEEE Access 6 (2018): 11007–16. http://dx.doi.org/10.1109/access.2018.2811341.
Full textLi, Songnong, Yao Yan, Yongliang Ji, Wenxin Peng, Lingyun Wan, and Puning Zhang. "Preference-Aware User Access Control Policy in Internet of Things." Sensors 23, no. 13 (2023): 5989. http://dx.doi.org/10.3390/s23135989.
Full textPaurav, Goel, Singh Avtar, and Goel Ashok. "Transmit power control and data rate enhancement in cognitive radio network using computational intelligence." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 2 (2022): 1602–16. https://doi.org/10.11591/ijece.v12i2.pp1602-1616.
Full textMéry, Dominique, and Stephan Merz. "Specification and Refinement of Access Control." JUCS - Journal of Universal Computer Science 13, no. (8) (2007): 1073–93. https://doi.org/10.3217/jucs-013-08-1073.
Full textKhuntia, Sucharita. "Secure Attribute-based User Access Control over AWS Cloud." International Journal for Research in Applied Science and Engineering Technology 9, no. 2 (2021): 7–33. http://dx.doi.org/10.22214/ijraset.2021.32950.
Full textOh, Soo-Hyun, and Sun-Ki Eun. "Remote user Access control Mechanism in Smart Grid environments." Transactions of The Korean Institute of Electrical Engineers 60, no. 2 (2011): 416–22. http://dx.doi.org/10.5370/kiee.2011.60.2.416.
Full textZerkouk, Meriem, Abdallah Mhamed, and Belhadri Messabih. "A User Profile Based Access Control Model and Architecture." International journal of Computer Networks & Communications 5, no. 1 (2013): 171–81. http://dx.doi.org/10.5121/ijcnc.2013.5112.
Full textSastry, JKR. "Implementing User defined Attribute and Policy based Access Control." International Journal of Emerging Trends in Engineering Research 8, no. 7 (2020): 3986–93. http://dx.doi.org/10.30534/ijeter/2020/171872020.
Full textNam-Yih Lee. "Integrating access control with user authentication using smart cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 943–48. http://dx.doi.org/10.1109/30.920444.
Full textIyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. http://dx.doi.org/10.59324/ejaset.2024.2(3).18.
Full textSpitzer, Stephan. "Better Control of User Web Access of Electronic Resources." Journal of Electronic Resources in Medical Libraries 6, no. 2 (2009): 91–100. http://dx.doi.org/10.1080/15424060902931997.
Full textKavuri, Satheesh, GangadharaRao Kancharla, and Basaveswara Rao Bobba. "Attribute Based User Control Access for Cloud Storage Data." International Journal of Computer Trends and Technology 11, no. 5 (2014): 193–97. http://dx.doi.org/10.14445/22312803/ijctt-v11p141.
Full textZheng, Xiao-lin, Yu Lei, and De-ren Chen. "Research of user access control for networked manufacturing system." Frontiers of Electrical and Electronic Engineering in China 1, no. 4 (2006): 465–69. http://dx.doi.org/10.1007/s11460-006-0089-x.
Full textIyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. https://doi.org/10.59324/ejaset.2024.2(3).18.
Full textStankovski, Stevan, Gordana Ostojic, Nikola Djukic, Srdjan Tegeltija, and Aleksandar Milojkovic. "Bluetooth parking access control." Sensor Review 34, no. 3 (2014): 244–54. http://dx.doi.org/10.1108/sr-06-2012-643.
Full textO'Shea, G. "Controlling the Dependency of User Access Control Mechanisms on Correctness of User Identification." Computer Journal 31, no. 6 (1988): 503–9. http://dx.doi.org/10.1093/comjnl/31.6.503.
Full textCheng, Yuan, Jaehong Park, and Ravi Sandhu. "An Access Control Model for Online Social Networks Using User-to-User Relationships." IEEE Transactions on Dependable and Secure Computing 13, no. 4 (2016): 424–36. http://dx.doi.org/10.1109/tdsc.2015.2406705.
Full textWang, Yan, Liqin Tian, and Zhenguo Chen. "Game Analysis of Access Control Based on User Behavior Trust." Information 10, no. 4 (2019): 132. http://dx.doi.org/10.3390/info10040132.
Full textOvabor, Kelvin, and Travis Atkison. "User-Centric Privacy Control in Identity Management and Access Control within Cloud-Based Systems." International Journal on Cybernetics & Informatics 12, no. 7 (2023): 59–71. http://dx.doi.org/10.5121/ijci.2023.120705.
Full textJunquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Full textPenelova, Maria. "Access Control Models." Cybernetics and Information Technologies 21, no. 4 (2021): 77–104. http://dx.doi.org/10.2478/cait-2021-0044.
Full textNaranjo, Juan Álvaro Muñoz, Pablo Orduña, Aitor Gómez-Goiri, Diego López-De-Ipiña, and Leocadio Casado. "Enabling User Access Control in Energy-constrained Wireless Smart Environments." JUCS - Journal of Universal Computer Science 19, no. (17) (2013): 2490–502. https://doi.org/10.3217/jucs-019-17-2490.
Full textWu, Yi, Wei Zhang, Hu Xiong, Zhiguang Qin, and Kuo-Hui Yeh. "Efficient access control with traceability and user revocation in IoT." Multimedia Tools and Applications 80, no. 20 (2021): 31487–508. http://dx.doi.org/10.1007/s11042-021-11286-0.
Full textMcIntosh, Timothy, A. S. M. Kayes, Yi-Ping Phoebe Chen, Alex Ng, and Paul Watters. "Dynamic user-centric access control for detection of ransomware attacks." Computers & Security 111 (December 2021): 102461. http://dx.doi.org/10.1016/j.cose.2021.102461.
Full textQi, Haojin, Yong Wang, Yueping Yang, Xiaodie Yu, and Xiaoming Ju. "Access control mechanism based on image recognition and user level." Journal of Physics: Conference Series 1453 (January 2020): 012102. http://dx.doi.org/10.1088/1742-6596/1453/1/012102.
Full textYen, Sung-Ming, and Chi-Sung Laih. "The design of dynamic access control scheme with user authentication." Computers & Mathematics with Applications 25, no. 7 (1993): 27–32. http://dx.doi.org/10.1016/0898-1221(93)90309-j.
Full textChung, Yu Fang, Hsiu Hui Lee, Feipei Lai, and Tzer Shyong Chen. "Access control in user hierarchy based on elliptic curve cryptosystem." Information Sciences 178, no. 1 (2008): 230–43. http://dx.doi.org/10.1016/j.ins.2007.08.001.
Full textS, Nilesh. "ExHABE with User Accountability for Secure Access Control in Cloud." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 4 (2015): 1848–53. http://dx.doi.org/10.17762/ijritcc2321-8169.150424.
Full textJaya Prakash, S., K. Varada Raj Kumar, and Deepak Nedunuri. "Dynamic security for multi-user access control in distributed environment." Journal of Physics: Conference Series 1228 (May 2019): 012016. http://dx.doi.org/10.1088/1742-6596/1228/1/012016.
Full textJing, Xu, Zhengnan Liu, Shuqin Li, Bin Qiao, and Gexu Tan. "A cloud-user behavior assessment based dynamic access control model." International Journal of System Assurance Engineering and Management 8, S3 (2015): 1966–75. http://dx.doi.org/10.1007/s13198-015-0411-1.
Full textSolanke, Vivek. "Secure Deduplication with User-Defined Access Control in Cloud Storage." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 394–400. http://dx.doi.org/10.22214/ijraset.2023.53650.
Full textGómez-Marín, Ernesto, Davide Martintoni, Valerio Senni, Encarnación Castillo, and Luis Parrilla. "Fine-Grained Access Control with User Revocation in Smart Manufacturing." Electronics 12, no. 13 (2023): 2843. http://dx.doi.org/10.3390/electronics12132843.
Full textYaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures." Information Resources Management Journal 30, no. 4 (2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.
Full textIkponmwosa, Oghogho, Otuagoma S., Ufuoma Jeffrey Okieke, et al. "FACE RECOGNITION SYSTEM FOR AUTOMATIC DOOR ACCESS CONTROL." Engineering and Technology Journal 08, no. 02 (2023): 1981–85. http://dx.doi.org/10.47191/etj/v8i2.03.
Full textPeeters, Roel, Dave Singelée, and Bart Preneel. "Threshold-Based Location-Aware Access Control." International Journal of Handheld Computing Research 2, no. 3 (2011): 22–37. http://dx.doi.org/10.4018/jhcr.2011070102.
Full textWang, Min, Hui Gao, and Tiejun Lv. "Energy-Efficient User Association and Power Control in the Heterogeneous Network." IEEE Access 5 (2017): 5059–68. http://dx.doi.org/10.1109/access.2017.2690305.
Full textKaushik, Shweta, and Charu Gandhi. "Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud." International Journal of Information Security and Privacy 15, no. 2 (2021): 29–52. http://dx.doi.org/10.4018/ijisp.2021040102.
Full textVeena, Devi Shastrimath V., Andrea Olivero Ashwini, and Bhat Deepa. "Railway Access Control System using Face Recognition." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 3 (2020): 444–48. https://doi.org/10.35940/ijrte.C4570.099320.
Full textM., Menaka, and Meenakshisundaram K. "10.11591/ijece.v8i5.pp3187-3193." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3187–93. https://doi.org/10.11591/ijece.v8i5.pp3187-3193.
Full textKordov, Krasimir, and Ismail Bilyal. "Access control system using Arduino microcontroller and RFID reader." Annual of Konstantin Preslavsky University of Shumen, Faculty of mathematics and informatics XXIV C (2023): 9–15. http://dx.doi.org/10.46687/qsfy7970.
Full text