Gotowa bibliografia na temat „User Access Control”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „User Access Control”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "User Access Control"
Jawed Khan, Aakib, and Shabana Mehfuz. "Fuzzy User Access Trust Model for Cloud Access Control." Computer Systems Science and Engineering 44, no. 1 (2023): 113–28. http://dx.doi.org/10.32604/csse.2023.023378.
Pełny tekst źródłaDanilescu, Marcel. "MODELING ACCESS CONTROL AND USER ACTIONS USING TRUST - BASED ACCESS CONTROL POLICIES." Journal of Social Sciences III (3) (September 1, 2020): 72–84. https://doi.org/10.5281/zenodo.3971967.
Pełny tekst źródłaKim, Dongmin, and Heeyoul Kim. "User-Centric Access Control for Android Platform." Journal of Korean Institute of Information Technology 13, no. 5 (2015): 49. http://dx.doi.org/10.14801/jkiit.2015.13.5.49.
Pełny tekst źródłaHarn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.
Pełny tekst źródłaKumar, Devender, Sai Kishore Pachigolla, Shubham Singh Manhas, and Karan Rawat. "PUF-based user access control scheme for IoT environment." Journal of Information and Optimization Sciences 44, no. 7 (2023): 1347–64. http://dx.doi.org/10.47974/jios-1321.
Pełny tekst źródłaRussell, D. "Access Control Techniques and Their Impact on User Accessibility in Computer Networks." SIJ Transactions on Computer Networks & Communication Engineering 7, no. 5 (2019): 16–19. http://dx.doi.org/10.9756/sijcnce/v7i5/07051014.
Pełny tekst źródłaWang, Haodong, and Qun Li. "Achieving distributed user access control in sensor networks." Ad Hoc Networks 10, no. 3 (2012): 272–83. http://dx.doi.org/10.1016/j.adhoc.2011.01.011.
Pełny tekst źródłaWang, Huaxia, Yu-Dong Yao, Xin Zhang, and Hongbin Li. "Secondary User Access Control in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 34, no. 11 (2016): 2866–73. http://dx.doi.org/10.1109/jsac.2016.2615262.
Pełny tekst źródłaDanilescu, Marcel, and Victor Beșliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII (2) (June 16, 2021): 67–78. https://doi.org/10.52326/jes.utm.2021.28(2).05.
Pełny tekst źródłaLi, Zhiyuan, Li Chen, and Weidong Wang. "Stochastic Downlink Power Control for Various User Requirements." IEEE Access 8 (2020): 8899–912. http://dx.doi.org/10.1109/access.2019.2963196.
Pełny tekst źródłaRozprawy doktorskie na temat "User Access Control"
Jiangcheng, Qin. "User Behavior Trust Based Cloud Computing Access Control Model." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12708.
Pełny tekst źródłaQiu, Wei. "Exploring user-to-role delegation in role-based access control." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27411.
Pełny tekst źródłaWang, Frank Yi-Fei. "Cryptographically enforced access control for user data in untrusted clouds." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/103669.
Pełny tekst źródłaLow, Marie Rose. "Self defence in open systems : protecting and sharing resources in a distributed open environment." Thesis, University of Hertfordshire, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241623.
Pełny tekst źródłaChuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.
Pełny tekst źródłaShaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.
Pełny tekst źródłaBeattie, Diane Lynn. "The informational needs of historians researching women : an archival user study." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26047.
Pełny tekst źródłaBhamidipati, Venkata Ramana Murthy. "Architectures and models for administration of user-role assignment in role based access control." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3357.
Pełny tekst źródłaMaw, Htoo Aung. "A trust-based adaptive access control model for wireless sensor networks." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16564.
Pełny tekst źródłaDeas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.
Pełny tekst źródłaKsiążki na temat "User Access Control"
Corporation, Quarterdeck. Procomm RapidRemote: User guide. Quarterdeck, 1996.
Znajdź pełny tekst źródłaJasper, Kim. User access & information protection: Managing open access & information protection. PROJECT CONSULT, 2002.
Znajdź pełny tekst źródłaHelme, Arne. A system for secure user-controlled electronic transactions. Shaker Publishing, 1997.
Znajdź pełny tekst źródłaTodorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.
Znajdź pełny tekst źródłaRodrigues, Charmaine. Karnataka Right to Information Act, 2000: A user guide. Edited by Muralidharan Y. G, Daruwala Maja, Nayak Venkatesh, Commonwealth Human Rights Initiative, Consumer Rights Education & Awareness Trust (Bangalore, India), and Karnataka (India). Commonwealth Human Rights Initiative, 2005.
Znajdź pełny tekst źródłaParker, Philip M. The 2009-2014 world outlook for user account provisioning technologies. Icon Group International, 2008.
Znajdź pełny tekst źródłaConference, Uniwersytet Jagielloński Instytut Bibliotekoznawstwa i. Informacji Naukowej International. Użytkownicy informacji elektronicznej. Wydawn. Uniwersytetu Jagiellońskiego, 2000.
Znajdź pełny tekst źródłaUnited States. Congress. House. Committee on Ways and Means. Subcommittee on Trade and United States. Congress. Senate. Committee on Finance, eds. Customs service: Passenger user fee collection needs to be reevaluated : report to the Committee on Finance, U.S. Senate, and Subcommittee on Trade, Committee on Ways and Means, House of Representatives. The Office, 1995.
Znajdź pełny tekst źródłaHeld, Gilbert. Netware login scripts: The productivity tool for administrators and users. McGraw-Hill, 1996.
Znajdź pełny tekst źródłaJohnson, Maritza Lupe. Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings. [publisher not identified], 2012.
Znajdź pełny tekst źródłaCzęści książek na temat "User Access Control"
Mahalle, Parikshit N., Shashikant S. Bhong, and Gitanjali R. Shinde. "User-Managed Access." In Authorization and Access Control. CRC Press, 2022. http://dx.doi.org/10.1201/9781003268482-4.
Pełny tekst źródłaSánchez, M., B. Jiménez, F. L. Gutièrrez, P. Paderewski, and J. L. Isla. "Access Control Model for Collaborative Business Processes." In Engineering the User Interface. Springer London, 2008. http://dx.doi.org/10.1007/978-1-84800-136-7_9.
Pełny tekst źródłaAmor, Selma Belhadj, and Samir M. Perlaza. "Decentralized K-User Gaussian Multiple Access Channels." In Network Games, Control, and Optimization. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-51034-7_5.
Pełny tekst źródłaWang, Haodong, and Qun Li. "Distributed User Access Control in Sensor Networks." In Distributed Computing in Sensor Systems. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11776178_19.
Pełny tekst źródłaShehab, Mohamed, Anna Cinzia Squicciarini, and Gail-Joon Ahn. "Beyond User-to-User Access Control for Online Social Networks." In Information and Communications Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88625-9_12.
Pełny tekst źródłaLiu, Xiaofan, Natasha Alechina, and Brian Logan. "Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38033-4_17.
Pełny tekst źródłaChinaei, Amir H., and Frank Wm Tompa. "User-Managed Access Control for Health Care Systems." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11552338_5.
Pełny tekst źródłaPlanas, Elena, Salvador Martínez, Marco Brambilla, and Jordi Cabot. "Towards Access Control Models for Conversational User Interfaces." In Enterprise, Business-Process and Information Systems Modeling. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07475-2_21.
Pełny tekst źródłaSobieski, Ścibor, and Bartosz Zieliński. "User Stories and Parameterized Role Based Access Control." In Model and Data Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23781-7_25.
Pełny tekst źródłaGonzález-Manzano, Lorena, Ana I. González-Tablas, José M. de Fuentes, and Arturo Ribagorda. "User-Managed Access Control in Web Based Social Networks." In Lecture Notes in Social Networks. Springer Vienna, 2013. http://dx.doi.org/10.1007/978-3-7091-0894-9_4.
Pełny tekst źródłaStreszczenia konferencji na temat "User Access Control"
Cao, Kai, and Zhe Wang. "Fine-Grained Access Control System for Multi-User Environments." In 2024 4th International Signal Processing, Communications and Engineering Management Conference (ISPCEM). IEEE, 2024. https://doi.org/10.1109/ispcem64498.2024.00096.
Pełny tekst źródłaWang, Xiao, Yunchuan Guo, Mingjie Yu, Ziyan Zhou, Liang Fang, and Fenghua Li. "Custominer: Mining Customized Access Control Policies under User-Defined Constraints." In 2024 IEEE International Conference on High Performance Computing and Communications (HPCC). IEEE, 2024. https://doi.org/10.1109/hpcc64274.2024.00191.
Pełny tekst źródłaSu, Linying. "User Behaviour Based Access Control Decision." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.349.
Pełny tekst źródłaXudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, and Dong Xuan. "DiffUser: Differentiated user access control on smartphones." In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, 2009. http://dx.doi.org/10.1109/mobhoc.2009.5337017.
Pełny tekst źródłaXu, Fei, Jingsha He, Xu Wu, and Jing Xu. "A User-Centric Privacy Access Control Model." In 2010 2nd International Symposium on Information Engineering and Electronic Commerce (IEEC). IEEE, 2010. http://dx.doi.org/10.1109/ieec.2010.5533251.
Pełny tekst źródłaWhalen, Tara, Diana Smetters, and Elizabeth F. Churchill. "User experiences with sharing and access control." In CHI '06 extended abstracts. ACM Press, 2006. http://dx.doi.org/10.1145/1125451.1125729.
Pełny tekst źródłaYang-Yang Li, Leon Yen, and Elvino S. Sousa. "Hybrid user access control in HSDPA femtocells." In 2010 IEEE Globecom Workshops (GC'10). IEEE, 2010. http://dx.doi.org/10.1109/glocomw.2010.5700407.
Pełny tekst źródłaThomas, Jacques, Federica Paci, Elisa Bertino, and Patrick Eugster. "User Tasks and Access Control overWeb Services." In IEEE International Conference on Web Services (ICWS 2007). IEEE, 2007. http://dx.doi.org/10.1109/icws.2007.182.
Pełny tekst źródłaZhu, Rui, Changguo Guo, Huaimin Wang, and Hailin Gong. "A User Trustworthiness Based Lightweight Access Control." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.432.
Pełny tekst źródłaStavrakakis, I., and D. Kazakos. "A non-homogeneous user population multi-user random access communication system." In 26th IEEE Conference on Decision and Control. IEEE, 1987. http://dx.doi.org/10.1109/cdc.1987.272461.
Pełny tekst źródłaRaporty organizacyjne na temat "User Access Control"
Long, A. C., Courtney Moskowitz, and Greg Ganger. A Prototype User Interface for Coarse-Grained Desktop Access Control. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada488514.
Pełny tekst źródłaNarayan, K., and D. Nelson. Using Authentication, Authorization, and Accounting Services to Dynamically Provision View-Based Access Control Model User-to-Group Mappings. Edited by R. Presuhn. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6065.
Pełny tekst źródłaBrown, Dustin, Matthew Hiett, Samantha Cook, Dylan Pasley, Melissa Pham, and Sandra LeGrand. Rotorcraft Resupply Site Selection (RRSS) v1.0 and the USACE Model Interface Platform (UMIP) : documentation and user’s guide. Engineer Research and Development Center (U.S.), 2023. http://dx.doi.org/10.21079/11681/47908.
Pełny tekst źródłaBaena Olabe, Paloma, and Juan Cruz Vieyra. Access to Information and Targeted Transparency Policies. Inter-American Development Bank, 2011. http://dx.doi.org/10.18235/0009022.
Pełny tekst źródłaCrooks, Roderic. Toward People’s Community Control of Technology: Race, Access, and Education. Social Science Research Council, 2022. http://dx.doi.org/10.35650/jt.3015.d.2022.
Pełny tekst źródłaZeilenga, K. The Lightweight Directory Access Protocol (LDAP) Don't Use Copy Control. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6171.
Pełny tekst źródłaAdair, Mike, and OGC Portal Admin. Access Control and Terms of Use (ToU) "Click-through" IPR Management. Open Geospatial Consortium, Inc., 2006. http://dx.doi.org/10.62973/05-111r2.
Pełny tekst źródłaMacGregor, W. I., K. Mehta, D. A. Cooper, and K. A. Scarfone. A recommendation for the use of PIV credentials in Physical Access Control Systems (PACS). National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-116.
Pełny tekst źródłaPoole, Joseph, John Barkley, Kevin Brady, Anthony Cincotta, and Wayne Salamon. Distributed communication methods and role-based access control for use in health care applications. National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.ir.5820.
Pełny tekst źródłaEslava, Marcela, Alessandro Maffioli, and Marcela Meléndez Arjona. Second-tier Government Banks and Access to Credit: Micro-Evidence from Colombia. Inter-American Development Bank, 2012. http://dx.doi.org/10.18235/0011364.
Pełny tekst źródła