To see the other types of publications on this topic, follow the link: User Access Control.

Journal articles on the topic 'User Access Control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'User Access Control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jawed Khan, Aakib, and Shabana Mehfuz. "Fuzzy User Access Trust Model for Cloud Access Control." Computer Systems Science and Engineering 44, no. 1 (2023): 113–28. http://dx.doi.org/10.32604/csse.2023.023378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Danilescu, Marcel. "MODELING ACCESS CONTROL AND USER ACTIONS USING TRUST - BASED ACCESS CONTROL POLICIES." Journal of Social Sciences III (3) (September 1, 2020): 72–84. https://doi.org/10.5281/zenodo.3971967.

Full text
Abstract:
This paper is a natural continuation of previous research on the implementation of confidentiality in small, medium, and virtual enterprises. This research began in 2009, with the work "Xml Based Techniques for Data Privacy in E-Business" which revealed that for small, medium, and virtual enterprises that often represent start-ups, trust is a basic element. Thus, in 2010, we published the paper "Control access to information by applying policies based on trust hierarchies". Present work shows a method of modeling the hierarchies of trust in computer systems. After a review
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Dongmin, and Heeyoul Kim. "User-Centric Access Control for Android Platform." Journal of Korean Institute of Information Technology 13, no. 5 (2015): 49. http://dx.doi.org/10.14801/jkiit.2015.13.5.49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Harn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kumar, Devender, Sai Kishore Pachigolla, Shubham Singh Manhas, and Karan Rawat. "PUF-based user access control scheme for IoT environment." Journal of Information and Optimization Sciences 44, no. 7 (2023): 1347–64. http://dx.doi.org/10.47974/jios-1321.

Full text
Abstract:
A very important part of any software or hardware associated with the Internet of Things (IoT) is the User Access Control. User Access Control deals with the important security features like authenticating a legitimate user, authorizing a user, etc. A very effective and secure way to ensure the user access control is: three factor user access control. Some three factor user authentication schemes have been developed in the past, brief details regarding them can be found in further sections of the paper. In this paper, we propose a new three factor user access control scheme. Our proposed schem
APA, Harvard, Vancouver, ISO, and other styles
6

Russell, D. "Access Control Techniques and Their Impact on User Accessibility in Computer Networks." SIJ Transactions on Computer Networks & Communication Engineering 7, no. 5 (2019): 16–19. http://dx.doi.org/10.9756/sijcnce/v7i5/07051014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Haodong, and Qun Li. "Achieving distributed user access control in sensor networks." Ad Hoc Networks 10, no. 3 (2012): 272–83. http://dx.doi.org/10.1016/j.adhoc.2011.01.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Huaxia, Yu-Dong Yao, Xin Zhang, and Hongbin Li. "Secondary User Access Control in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 34, no. 11 (2016): 2866–73. http://dx.doi.org/10.1109/jsac.2016.2615262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Danilescu, Marcel, and Victor Beșliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII (2) (June 16, 2021): 67–78. https://doi.org/10.52326/jes.utm.2021.28(2).05.

Full text
Abstract:
In recent decades, the number of researches on access control and user actions in computer systems has increased. Over time, there have been two models of implementing Mandatory Access Control (MAC) policies for government institutions and Discretionary Access Control (DAC) for the business environment, policies that various access control modeling solutions seek to implement. Among the access control modeling solutions developed are Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), presented in the U.S.A. by the National Institute of Standard and Technology (NIST). I
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Zhiyuan, Li Chen, and Weidong Wang. "Stochastic Downlink Power Control for Various User Requirements." IEEE Access 8 (2020): 8899–912. http://dx.doi.org/10.1109/access.2019.2963196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Huaxia, Yu-Dong Yao, and Shengliang Peng. "Prioritized Secondary User Access Control in Cognitive Radio Networks." IEEE Access 6 (2018): 11007–16. http://dx.doi.org/10.1109/access.2018.2811341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Li, Songnong, Yao Yan, Yongliang Ji, Wenxin Peng, Lingyun Wan, and Puning Zhang. "Preference-Aware User Access Control Policy in Internet of Things." Sensors 23, no. 13 (2023): 5989. http://dx.doi.org/10.3390/s23135989.

Full text
Abstract:
There are multiple types of services in the Internet of Things, and existing access control methods do not consider situations wherein the same types of services have multiple access options. In order to ensure the QoS quality of user access and realize the reasonable utilization of Internet of Things network resources, it is necessary to consider the characteristics of different services to design applicable access control strategies. In this paper, a preference-aware user access control strategy in slices is proposed, which can increase the number of users in the system while balancing slice
APA, Harvard, Vancouver, ISO, and other styles
13

Paurav, Goel, Singh Avtar, and Goel Ashok. "Transmit power control and data rate enhancement in cognitive radio network using computational intelligence." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 2 (2022): 1602–16. https://doi.org/10.11591/ijece.v12i2.pp1602-1616.

Full text
Abstract:
Underutilized radio frequencies are the chief apprehension in advance radio communication. The radio recourses are sparse and costly and their efficient allocation has become a challenge. Cognitive radio networks are the ray of hope. Cognitive radio networks use dynamic spectrum access technique to opportunistically retrieve and share the licensed spectrum. The licensed users are called primary users and the users that opportunistically access the licensed spectrum all called secondary users. The proposed system is a feedback system that work on demand and supply concept, in which secondary re
APA, Harvard, Vancouver, ISO, and other styles
14

Méry, Dominique, and Stephan Merz. "Specification and Refinement of Access Control." JUCS - Journal of Universal Computer Science 13, no. (8) (2007): 1073–93. https://doi.org/10.3217/jucs-013-08-1073.

Full text
Abstract:
We consider the extension of fair event system specifications by concepts of access control (prohibitions, user rights, and obligations). We give proof rules for verifying that an access control policy is correctly implemented in a system, and consider preservation of access control by refinement of event systems. Prohibitions and obligations are expressed as properties of traces and are preserved by standard refinement notions of event systems. Preservation of user rights is not guaranteed by construction; we propose to combine implementation-level user rights and obligations to implement hig
APA, Harvard, Vancouver, ISO, and other styles
15

Khuntia, Sucharita. "Secure Attribute-based User Access Control over AWS Cloud." International Journal for Research in Applied Science and Engineering Technology 9, no. 2 (2021): 7–33. http://dx.doi.org/10.22214/ijraset.2021.32950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Oh, Soo-Hyun, and Sun-Ki Eun. "Remote user Access control Mechanism in Smart Grid environments." Transactions of The Korean Institute of Electrical Engineers 60, no. 2 (2011): 416–22. http://dx.doi.org/10.5370/kiee.2011.60.2.416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Zerkouk, Meriem, Abdallah Mhamed, and Belhadri Messabih. "A User Profile Based Access Control Model and Architecture." International journal of Computer Networks & Communications 5, no. 1 (2013): 171–81. http://dx.doi.org/10.5121/ijcnc.2013.5112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Sastry, JKR. "Implementing User defined Attribute and Policy based Access Control." International Journal of Emerging Trends in Engineering Research 8, no. 7 (2020): 3986–93. http://dx.doi.org/10.30534/ijeter/2020/171872020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Nam-Yih Lee. "Integrating access control with user authentication using smart cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 943–48. http://dx.doi.org/10.1109/30.920444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Iyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. http://dx.doi.org/10.59324/ejaset.2024.2(3).18.

Full text
Abstract:
Safeguarding digital and physical premises against unauthorized entry is increasingly crucial in an era characterized by fast technological advancements and escalating security risks. Biometric security devices for controlling entry employ distinct form and behavioral attributes to authenticate persons and regulate access, hence offering innovative solutions. This paper offers a comprehensive review of the utilization of fingerprint recognition methods in the creation of an entry authorization device with biometrics. The material and methods section provides a detailed description of the hardw
APA, Harvard, Vancouver, ISO, and other styles
21

Spitzer, Stephan. "Better Control of User Web Access of Electronic Resources." Journal of Electronic Resources in Medical Libraries 6, no. 2 (2009): 91–100. http://dx.doi.org/10.1080/15424060902931997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Kavuri, Satheesh, GangadharaRao Kancharla, and Basaveswara Rao Bobba. "Attribute Based User Control Access for Cloud Storage Data." International Journal of Computer Trends and Technology 11, no. 5 (2014): 193–97. http://dx.doi.org/10.14445/22312803/ijctt-v11p141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zheng, Xiao-lin, Yu Lei, and De-ren Chen. "Research of user access control for networked manufacturing system." Frontiers of Electrical and Electronic Engineering in China 1, no. 4 (2006): 465–69. http://dx.doi.org/10.1007/s11460-006-0089-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Iyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. https://doi.org/10.59324/ejaset.2024.2(3).18.

Full text
Abstract:
Safeguarding digital and physical premises against unauthorized entry is increasingly crucial in an era characterized by fast technological advancements and escalating security risks. Biometric security devices for controlling entry employ distinct form and behavioral attributes to authenticate persons and regulate access, hence offering innovative solutions. This paper offers a comprehensive review of the utilization of fingerprint recognition methods in the creation of an entry authorization device with biometrics. The material and methods section provides a detailed description of the hardw
APA, Harvard, Vancouver, ISO, and other styles
25

Stankovski, Stevan, Gordana Ostojic, Nikola Djukic, Srdjan Tegeltija, and Aleksandar Milojkovic. "Bluetooth parking access control." Sensor Review 34, no. 3 (2014): 244–54. http://dx.doi.org/10.1108/sr-06-2012-643.

Full text
Abstract:
Purpose – The purpose of this paper is to describe an approach of using mobile phones with Bluetooth technology to enter/exit restricted area. Design/methodology/approach – Applied Bluetooth technology implemented in mobile phones enables the user to perform the identification and the state of presence while entering/exiting the parking space without stopping the vehicle. For the successful implementation of this method for presence detection and proper identification, it is necessary to determine the values of the Bluetooth signal. Findings – This paper discuses a case study that has been don
APA, Harvard, Vancouver, ISO, and other styles
26

O'Shea, G. "Controlling the Dependency of User Access Control Mechanisms on Correctness of User Identification." Computer Journal 31, no. 6 (1988): 503–9. http://dx.doi.org/10.1093/comjnl/31.6.503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Cheng, Yuan, Jaehong Park, and Ravi Sandhu. "An Access Control Model for Online Social Networks Using User-to-User Relationships." IEEE Transactions on Dependable and Secure Computing 13, no. 4 (2016): 424–36. http://dx.doi.org/10.1109/tdsc.2015.2406705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Yan, Liqin Tian, and Zhenguo Chen. "Game Analysis of Access Control Based on User Behavior Trust." Information 10, no. 4 (2019): 132. http://dx.doi.org/10.3390/info10040132.

Full text
Abstract:
Due to the dynamics and uncertainty of the current network environment, access control is one of the most important factors in guaranteeing network information security. How to construct a scientific and accurate access control model is a current research focus. In actual access control mechanisms, users with high trust values bring better benefits, but the losses will also be greater once cheating access is adopted. A general access control game model that can reflect both trust and risk is established in this paper. First, we construct an access control game model with user behavior trust be
APA, Harvard, Vancouver, ISO, and other styles
29

Ovabor, Kelvin, and Travis Atkison. "User-Centric Privacy Control in Identity Management and Access Control within Cloud-Based Systems." International Journal on Cybernetics & Informatics 12, no. 7 (2023): 59–71. http://dx.doi.org/10.5121/ijci.2023.120705.

Full text
Abstract:
The ability to effectively implement user-centric privacy controls in cloud-based identity access management (IAM) systems is crucial in today's age of rapidly rising data and increased privacy concerns. The study tackles the scalability issue inside cloud-based IAM systems, where user-centric privacy controls are paramount. The study aims to guarantee effective system performance despite growing numbers of users and data items by following a carefully crafted approach that uses user-centric privacy algorithms. The findings are expected to increase scalability while maintaining security and us
APA, Harvard, Vancouver, ISO, and other styles
30

Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.

Full text
Abstract:
Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know
APA, Harvard, Vancouver, ISO, and other styles
31

Penelova, Maria. "Access Control Models." Cybernetics and Information Technologies 21, no. 4 (2021): 77–104. http://dx.doi.org/10.2478/cait-2021-0044.

Full text
Abstract:
Abstract Access control is a part of the security of information technologies. Access control regulates the access requests to system resources. The access control logic is formalized in models. Many access control models exist. They vary in their design, components, policies and areas of application. With the developing of information technologies, more complex access control models have been created. This paper is concerned with overview and analysis for a number of access control models. First, an overview of access control models is presented. Second, they are analyzed and compared by a nu
APA, Harvard, Vancouver, ISO, and other styles
32

Naranjo, Juan Álvaro Muñoz, Pablo Orduña, Aitor Gómez-Goiri, Diego López-De-Ipiña, and Leocadio Casado. "Enabling User Access Control in Energy-constrained Wireless Smart Environments." JUCS - Journal of Universal Computer Science 19, no. (17) (2013): 2490–502. https://doi.org/10.3217/jucs-019-17-2490.

Full text
Abstract:
This work introduces a novel access control solution for wireless network services in Internet of Things scenarios. We focus on a minimal use of computation, energy and storage resources at wireless sensors so as to address constrained devices: the proposed methods for key distribution and access control rely on extremely fast key derivation functions and, for the same reason, memory usage is reduced since keys are computed on the fly when needed. Our solution achieves privacy, authentication, semantic security, low energy, low computational demand and impacts mitigation of compromised devices
APA, Harvard, Vancouver, ISO, and other styles
33

Wu, Yi, Wei Zhang, Hu Xiong, Zhiguang Qin, and Kuo-Hui Yeh. "Efficient access control with traceability and user revocation in IoT." Multimedia Tools and Applications 80, no. 20 (2021): 31487–508. http://dx.doi.org/10.1007/s11042-021-11286-0.

Full text
Abstract:
AbstractWith the universality and availability of Internet of Things (IoT), data privacy protection in IoT has become a hot issue. As a branch of attribute-based encryption (ABE), ciphertext policy attribute-based encryption (CP-ABE) is widely used in IoT to offer flexible one-to-many encryption. However, in IoT, different mobile devices share messages collected, transmission of large amounts of data brings huge burdens to mobile devices. Efficiency is a bottleneck which restricts the wide application and adoption of CP-ABE in Internet of things. Besides, the decryption key in CP-ABE is shared
APA, Harvard, Vancouver, ISO, and other styles
34

McIntosh, Timothy, A. S. M. Kayes, Yi-Ping Phoebe Chen, Alex Ng, and Paul Watters. "Dynamic user-centric access control for detection of ransomware attacks." Computers & Security 111 (December 2021): 102461. http://dx.doi.org/10.1016/j.cose.2021.102461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Qi, Haojin, Yong Wang, Yueping Yang, Xiaodie Yu, and Xiaoming Ju. "Access control mechanism based on image recognition and user level." Journal of Physics: Conference Series 1453 (January 2020): 012102. http://dx.doi.org/10.1088/1742-6596/1453/1/012102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Yen, Sung-Ming, and Chi-Sung Laih. "The design of dynamic access control scheme with user authentication." Computers & Mathematics with Applications 25, no. 7 (1993): 27–32. http://dx.doi.org/10.1016/0898-1221(93)90309-j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Chung, Yu Fang, Hsiu Hui Lee, Feipei Lai, and Tzer Shyong Chen. "Access control in user hierarchy based on elliptic curve cryptosystem." Information Sciences 178, no. 1 (2008): 230–43. http://dx.doi.org/10.1016/j.ins.2007.08.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

S, Nilesh. "ExHABE with User Accountability for Secure Access Control in Cloud." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 4 (2015): 1848–53. http://dx.doi.org/10.17762/ijritcc2321-8169.150424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Jaya Prakash, S., K. Varada Raj Kumar, and Deepak Nedunuri. "Dynamic security for multi-user access control in distributed environment." Journal of Physics: Conference Series 1228 (May 2019): 012016. http://dx.doi.org/10.1088/1742-6596/1228/1/012016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Jing, Xu, Zhengnan Liu, Shuqin Li, Bin Qiao, and Gexu Tan. "A cloud-user behavior assessment based dynamic access control model." International Journal of System Assurance Engineering and Management 8, S3 (2015): 1966–75. http://dx.doi.org/10.1007/s13198-015-0411-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Solanke, Vivek. "Secure Deduplication with User-Defined Access Control in Cloud Storage." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 394–400. http://dx.doi.org/10.22214/ijraset.2023.53650.

Full text
Abstract:
Abstract: Cloud storage is one of the most important services of cloud computing, offering significant benefits to users by allowing them to outsource their data for storage and sharing with authorized parties. Secure deduplication has been extensively researched in cloud storage, aiming to eliminate redundancy in encrypted data and reduce storage space. Our proposed solution focuses on uploading files to the cloud storage system. When a file is uploaded, it is checked to see if an identical file already exists. If a duplicate is found, the system displays an entry indicating that the file alr
APA, Harvard, Vancouver, ISO, and other styles
42

Gómez-Marín, Ernesto, Davide Martintoni, Valerio Senni, Encarnación Castillo, and Luis Parrilla. "Fine-Grained Access Control with User Revocation in Smart Manufacturing." Electronics 12, no. 13 (2023): 2843. http://dx.doi.org/10.3390/electronics12132843.

Full text
Abstract:
Collaborative manufacturing is a key enabler of Industry 4.0 that requires secure data sharing among multiple parties. However, intercompany data-sharing raises important privacy and security concerns, particularly given intellectual property and business-sensitive information collected by many devices. In this paper, we propose a solution that combines four technologies to address these challenges: Attribute-Based Encryption for data access control, blockchain for data integrity and non-repudiation, Hardware Security Modules for authenticity, and the Interplanetary File System for data scalab
APA, Harvard, Vancouver, ISO, and other styles
43

Yaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures." Information Resources Management Journal 30, no. 4 (2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.

Full text
Abstract:
Almost all computing systems and applications in organizations include some form of access control mechanisms. Managing secure access to computing resources is an important but a challenging task, requiring both administrative and technical measures. This study examines the influence of administrative access control measures on technical access control mechanisms. Based on the four access control clauses defined by ISO/IEC27002, this study develops a model to empirically test the impact of access control policies on systems and applications control activities. The study employs Partial Least S
APA, Harvard, Vancouver, ISO, and other styles
44

Ikponmwosa, Oghogho, Otuagoma S., Ufuoma Jeffrey Okieke, et al. "FACE RECOGNITION SYSTEM FOR AUTOMATIC DOOR ACCESS CONTROL." Engineering and Technology Journal 08, no. 02 (2023): 1981–85. http://dx.doi.org/10.47191/etj/v8i2.03.

Full text
Abstract:
A face recognition system for automatic door access control has been developed in this work with a view to providing a relatively more robust and foolproof access control which can provide better security and reduce human errors inherent in other conventional methods. The system was designed with machine learning and artificial intelligence to capture faces, train faces with machine mode, and run trained faces to grant access to the user. The system uses the RaspberryPi module, camera module, servo motor and the GSM module which were all incorporated into the fabricated building to make up the
APA, Harvard, Vancouver, ISO, and other styles
45

Peeters, Roel, Dave Singelée, and Bart Preneel. "Threshold-Based Location-Aware Access Control." International Journal of Handheld Computing Research 2, no. 3 (2011): 22–37. http://dx.doi.org/10.4018/jhcr.2011070102.

Full text
Abstract:
Designing a secure, resilient and user-friendly access control system is a challenging task. In this article, a threshold-based location-aware access control mechanism is proposed. This design uniquely combines the concepts of secret sharing and distance bounding protocols to tackle various security vulnerabilities. The proposed solution makes use of the fact that the user carries around various personal devices. This solution offers protection against any set of or fewer compromised user’s devices, with being an adjustable threshold number. It removes the single point of failure in the system
APA, Harvard, Vancouver, ISO, and other styles
46

Wang, Min, Hui Gao, and Tiejun Lv. "Energy-Efficient User Association and Power Control in the Heterogeneous Network." IEEE Access 5 (2017): 5059–68. http://dx.doi.org/10.1109/access.2017.2690305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kaushik, Shweta, and Charu Gandhi. "Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud." International Journal of Information Security and Privacy 15, no. 2 (2021): 29–52. http://dx.doi.org/10.4018/ijisp.2021040102.

Full text
Abstract:
Cloud computing started a new era for IT enterprises. It allows the movement of application from local to remote location, massive data storage. Owner has access to centralized or decentralized data storage server, where data management handled by remote vendor. But, the heterogeneous and dynamic nature of cloud introduces security challenges. Among them, access control and integrity checking are most important which incur high consideration. Attribute-based encryption is one of the access control technique which allows integration of access policies, attributes, and encrypted data. In this pa
APA, Harvard, Vancouver, ISO, and other styles
48

Veena, Devi Shastrimath V., Andrea Olivero Ashwini, and Bhat Deepa. "Railway Access Control System using Face Recognition." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 3 (2020): 444–48. https://doi.org/10.35940/ijrte.C4570.099320.

Full text
Abstract:
Nowadays booking tickets and getting inside a railway station is a difficult task. Manual checking becomes a burden and time consuming. Also as everything is getting digitized in this modern world introduce face recognition and Quick Response (QR) code system for entry helps in passenger convenience. Face recognition is a method of identifying or verifying the identity of an individual using their face. Face recognition systems can be used to identify people in photos, video, or in real-time. So this system focuses on passengers’ convenience through allowing them to book tickets online a
APA, Harvard, Vancouver, ISO, and other styles
49

M., Menaka, and Meenakshisundaram K. "10.11591/ijece.v8i5.pp3187-3193." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3187–93. https://doi.org/10.11591/ijece.v8i5.pp3187-3193.

Full text
Abstract:
To be able to leverage big data to achieve enhanced strategic insight and make informed decision, an efficient access control mechanism is needed for ensuring end to end security of such information asset. Attribute Based Access Control (ABAC), Role Based Access Control (RBAC) and Event Based Access Control (EBAC) are widely used access control mechanisms. The ABAC system is much more complex in terms of policy reviews, hence analyzing the policy and reviewing or changing user permission are quite complex task. RBAC system is labor intensive and time consuming to build a model instance and it
APA, Harvard, Vancouver, ISO, and other styles
50

Kordov, Krasimir, and Ismail Bilyal. "Access control system using Arduino microcontroller and RFID reader." Annual of Konstantin Preslavsky University of Shumen, Faculty of mathematics and informatics XXIV C (2023): 9–15. http://dx.doi.org/10.46687/qsfy7970.

Full text
Abstract:
This article presents access control system constructed with single-board Arduino Uno and RFID technology for user identification. Additional web based system is used for user registration, access restriction, and access monitoring by recording data logs into database.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!