Literatura académica sobre el tema "Access control"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Access control".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Access control"
Chepuru, Anitha, Dr K. Venugopal Rao, and Amardeep Matta. "Server Access Control." International Journal of Scientific Research 1, no. 7 (June 1, 2012): 78–79. http://dx.doi.org/10.15373/22778179/dec2012/31.
Texto completoSaunders, G., M. Hitchens, and V. Varadharajan. "Role-based access control and the access control matrix." ACM SIGOPS Operating Systems Review 35, no. 4 (October 2001): 6–20. http://dx.doi.org/10.1145/506084.506085.
Texto completoAbd-Ali, Jamal. "A Metamodel for Hybrid Access Control Policies." Journal of Software 10, no. 7 (July 2015): 784–87. http://dx.doi.org/10.17706//jsw.10.7.784-797.
Texto completoPenelova, Maria. "Access Control Models." Cybernetics and Information Technologies 21, no. 4 (December 1, 2021): 77–104. http://dx.doi.org/10.2478/cait-2021-0044.
Texto completoSchuldt, Alison. "PAR access control." Nature Reviews Molecular Cell Biology 12, no. 11 (October 21, 2011): 693. http://dx.doi.org/10.1038/nrm3220.
Texto completoSubramanian, Savithri. "Control and access." Contributions to Indian Sociology 42, no. 1 (April 2008): 93–122. http://dx.doi.org/10.1177/006996670704200105.
Texto completoFriedman, Michael. "Access-control software." Computers & Security 7, no. 5 (October 1988): 523. http://dx.doi.org/10.1016/0167-4048(88)90293-3.
Texto completoCollinson, Helen. "Workstation access control." Computers & Security 14, no. 2 (January 1995): 121. http://dx.doi.org/10.1016/0167-4048(95)90061-6.
Texto completoYaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures." Information Resources Management Journal 30, no. 4 (October 2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.
Texto completoIkponmwosa, Oghogho, Otuagoma S., Ufuoma Jeffrey Okieke, Ebimene E. E., Dania B. P., Azubogu D. I., Anamonye U.G., et al. "FACE RECOGNITION SYSTEM FOR AUTOMATIC DOOR ACCESS CONTROL." Engineering and Technology Journal 08, no. 02 (February 3, 2023): 1981–85. http://dx.doi.org/10.47191/etj/v8i2.03.
Texto completoTesis sobre el tema "Access control"
SILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.
Texto completoAtkins, Derek A. (Derek Allan). "Media Bank--access and access control." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/61086.
Texto completoMay, Brian 1975. "Scalable access control." Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.
Texto completode, la Motte L. "Professional Access Control." Thesis, Honours thesis, University of Tasmania, 2004. https://eprints.utas.edu.au/118/1/front_Thesis.pdf.
Texto completoHoppenstand, Gregory S. "Secure access control with high access precision/." Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/23386.
Texto completoMagnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.
Texto completoMacfie, Alex. "Semantic role-based access control." Thesis, University of Westminster, 2014. https://westminsterresearch.westminster.ac.uk/item/964y2/semantic-role-based-access-control.
Texto completoSchmidt, Ronald. "Distributed Access Control System." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100336.
Texto completoKnight, G. S. "Scenario-based access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.
Texto completoLukefahr, Joseph W. "Service-oriented access control." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43948.
Texto completoLibros sobre el tema "Access control"
Jenny, Baxter, and Key Note Publications, eds. Access control. 7th ed. Hampton: Key Note, 2005.
Buscar texto completoEmily, Pattullo, and Key Note Publications, eds. Access control. 4th ed. Hampton: Key Note, 2002.
Buscar texto completoJane, Griffiths, and Key Note Publications, eds. Access control. 6th ed. Hampton: Key Note, 2004.
Buscar texto completoDominic, Fenn, and Key Note Publications, eds. Access control. 2nd ed. Hampton: Key Note, 1999.
Buscar texto completoLarson, Jessica Megan. Snowflake Access Control. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8038-6.
Texto completoFerraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.
Buscar texto completoHoppenstand, Gregory S. Secure access control with high access precision. Monterey, California: Naval Postgraduate School, 1988.
Buscar texto completoKayem, Anne V. D. M., Selim G. Akl, and Patrick Martin. Adaptive Cryptographic Access Control. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-6655-1.
Texto completoBoonkrong, Sirapat. Authentication and Access Control. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.
Texto completoMike, Hunt, and Jordan& Sons Limited., eds. Britain's access control industry. London: Jordan, 1988.
Buscar texto completoCapítulos de libros sobre el tema "Access control"
Malik, Waqar. "Access Control." In Learn Swift 2 on the Mac, 177–83. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1627-9_19.
Texto completode Villiers, Sidriaan. "Access Control." In The Cyber Risk Handbook, 321–34. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119309741.ch22.
Texto completoYao, Jiewen, and Vincent Zimmer. "Access Control." In Building Secure Firmware, 335–82. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6106-4_10.
Texto completoMalik, Waqar. "Access Control." In Learn Swift on the Mac, 109–15. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0376-7_11.
Texto completoFerrari, Elena. "Access Control." In Encyclopedia of Database Systems, 1–6. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_6-3.
Texto completoYang, Kan. "Access Control." In Encyclopedia of Wireless Networks, 1–3. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_289.
Texto completoFerrari, Elena. "Access Control." In Encyclopedia of Database Systems, 7–11. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_6.
Texto completoPieprzyk, Josef, Thomas Hardjono, and Jennifer Seberry. "Access Control." In Fundamentals of Computer Security, 565–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-07324-7_17.
Texto completoShekhar, Shashi, and Hui Xiong. "Access Control." In Encyclopedia of GIS, 10. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_14.
Texto completoYang, Kan. "Access Control." In Encyclopedia of Wireless Networks, 1–3. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_289-1.
Texto completoActas de conferencias sobre el tema "Access control"
Naveena, Kolli, M. Suleman Basha, Chanda Sai Sathvik, Tadikamalla Revanth Mahajan, and Polepaka Nithin Emmanuel. "Enhancing Access Control in Cloud Storage through Sanitizable Access Control System." In 2024 International Conference on Computational Intelligence for Security, Communication and Sustainable Development (CISCSD), 143–47. IEEE, 2024. https://doi.org/10.1109/ciscsd63381.2024.00042.
Texto completoBarker, Steve. "Personalizing access control by generalizing access control." In Proceeding of the 15th ACM symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1809842.1809866.
Texto completoJaeger, Trent, Antony Edwards, and Xiaolan Zhang. "Managing access control policies using access control spaces." In the seventh ACM symposium. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/507711.507713.
Texto completoOsborn, Sylvia. "Mandatory access control and role-based access control revisited." In the second ACM workshop. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/266741.266751.
Texto completoSwaminathan, Kishore. "Negotiated Access Control." In 1985 IEEE Symposium on Security and Privacy. IEEE, 1985. http://dx.doi.org/10.1109/sp.1985.10019.
Texto completoLawson, Curt, and Feng Zhu. "Sentential access control." In the 50th Annual Southeast Regional Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2184512.2184582.
Texto completoGehani, Ashish, and Surendar Chandra. "Parameterized access control." In the 4th international conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1460877.1460922.
Texto completoNaldurg, Prasad, and Roy H. Campbell. "Dynamic access control." In the eighth ACM symposium. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/775412.775442.
Texto completoCautis, Bogdan. "Distributed access control." In the 12th ACM symposium. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1266840.1266850.
Texto completoArnab, Alapan, and Andrew Hutchison. "Persistent access control." In the 2007 ACM workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1314276.1314286.
Texto completoInformes sobre el tema "Access control"
Gartmann, Rüdiger, and Bastian Schäffer, eds. License-Based Access Control. Open Geospatial Consortium, Inc., March 2011. http://dx.doi.org/10.62973/11-018.
Texto completoStokes, E., D. Byrne, B. Blakley, and P. Behera. Access Control Requirements for LDAP. RFC Editor, May 2000. http://dx.doi.org/10.17487/rfc2820.
Texto completoTreado, Stephen J., Steven C. Cook, and Michael Galler. Distributed biometric access control testbed. Gaithersburg, MD: National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.ir.7190.
Texto completoHu, Vincent C., David F. Ferraiolo, and D. Rick Kuhn. Assessment of access control systems. Gaithersburg, MD: National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.ir.7316.
Texto completoQuirolgico, Stephen, Vincent Hu, and Tom Karygiannis. Access control for SAR systems. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7815.
Texto completoBierman, A., and M. Bjorklund. Network Configuration Access Control Model. RFC Editor, March 2018. http://dx.doi.org/10.17487/rfc8341.
Texto completoKoskelo, Markku, Steven Kadner, and Steven Horowitz. Biometric Access Control System Industrialization. Office of Scientific and Technical Information (OSTI), May 2020. http://dx.doi.org/10.2172/1763279.
Texto completoHu, Vincent C. Blockchain for Access Control Systems. National Institute of Standards and Technology, December 2021. http://dx.doi.org/10.6028/nist.ir.8403-draft.
Texto completoHu, Vincent C. Blockchain for Access Control Systems. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8403.
Texto completoHu, Vincent C. Access Control for NoSQL Databases. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8504.ipd.
Texto completo