Gotowa bibliografia na temat „User Access Control”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „User Access Control”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "User Access Control"

1

Jawed Khan, Aakib, and Shabana Mehfuz. "Fuzzy User Access Trust Model for Cloud Access Control." Computer Systems Science and Engineering 44, no. 1 (2023): 113–28. http://dx.doi.org/10.32604/csse.2023.023378.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Danilescu, Marcel. "MODELING ACCESS CONTROL AND USER ACTIONS USING TRUST - BASED ACCESS CONTROL POLICIES." Journal of Social Sciences III (3) (September 1, 2020): 72–84. https://doi.org/10.5281/zenodo.3971967.

Pełny tekst źródła
Streszczenie:
This paper is a natural continuation of previous research on the implementation of confidentiality in small, medium, and virtual enterprises. This research began in 2009, with the work "Xml Based Techniques for Data Privacy in E-Business" which revealed that for small, medium, and virtual enterprises that often represent start-ups, trust is a basic element. Thus, in 2010, we published the paper "Control access to information by applying policies based on trust hierarchies". Present work shows a method of modeling the hierarchies of trust in computer systems. After a review
Style APA, Harvard, Vancouver, ISO itp.
3

Kim, Dongmin, and Heeyoul Kim. "User-Centric Access Control for Android Platform." Journal of Korean Institute of Information Technology 13, no. 5 (2015): 49. http://dx.doi.org/10.14801/jkiit.2015.13.5.49.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Harn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kumar, Devender, Sai Kishore Pachigolla, Shubham Singh Manhas, and Karan Rawat. "PUF-based user access control scheme for IoT environment." Journal of Information and Optimization Sciences 44, no. 7 (2023): 1347–64. http://dx.doi.org/10.47974/jios-1321.

Pełny tekst źródła
Streszczenie:
A very important part of any software or hardware associated with the Internet of Things (IoT) is the User Access Control. User Access Control deals with the important security features like authenticating a legitimate user, authorizing a user, etc. A very effective and secure way to ensure the user access control is: three factor user access control. Some three factor user authentication schemes have been developed in the past, brief details regarding them can be found in further sections of the paper. In this paper, we propose a new three factor user access control scheme. Our proposed schem
Style APA, Harvard, Vancouver, ISO itp.
6

Russell, D. "Access Control Techniques and Their Impact on User Accessibility in Computer Networks." SIJ Transactions on Computer Networks & Communication Engineering 7, no. 5 (2019): 16–19. http://dx.doi.org/10.9756/sijcnce/v7i5/07051014.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Wang, Haodong, and Qun Li. "Achieving distributed user access control in sensor networks." Ad Hoc Networks 10, no. 3 (2012): 272–83. http://dx.doi.org/10.1016/j.adhoc.2011.01.011.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Wang, Huaxia, Yu-Dong Yao, Xin Zhang, and Hongbin Li. "Secondary User Access Control in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 34, no. 11 (2016): 2866–73. http://dx.doi.org/10.1109/jsac.2016.2615262.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Danilescu, Marcel, and Victor Beșliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII (2) (June 16, 2021): 67–78. https://doi.org/10.52326/jes.utm.2021.28(2).05.

Pełny tekst źródła
Streszczenie:
In recent decades, the number of researches on access control and user actions in computer systems has increased. Over time, there have been two models of implementing Mandatory Access Control (MAC) policies for government institutions and Discretionary Access Control (DAC) for the business environment, policies that various access control modeling solutions seek to implement. Among the access control modeling solutions developed are Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), presented in the U.S.A. by the National Institute of Standard and Technology (NIST). I
Style APA, Harvard, Vancouver, ISO itp.
10

Li, Zhiyuan, Li Chen, and Weidong Wang. "Stochastic Downlink Power Control for Various User Requirements." IEEE Access 8 (2020): 8899–912. http://dx.doi.org/10.1109/access.2019.2963196.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "User Access Control"

1

Jiangcheng, Qin. "User Behavior Trust Based Cloud Computing Access Control Model." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-12708.

Pełny tekst źródła
Streszczenie:
Context. With the development of computer software, hardware, and communication technologies, a new type of human-centered computing model, called Cloud Computing (CC) has been established as a commercial computer network service. However, the openness of CC brings huge security challenge to the identity-based access control system, as it not able to effectively prevent malicious users accessing; information security problems, system stability problems, and also the trust issues between cloud service users (CSUs) and cloud service providers (CSPs) are arising therefrom. User behavior trust (UB
Style APA, Harvard, Vancouver, ISO itp.
2

Qiu, Wei. "Exploring user-to-role delegation in role-based access control." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27411.

Pełny tekst źródła
Streszczenie:
Mechanisms must be provided to protect resources from attackers when users request access to resources in network environments. Role-Based Access Control (RBAC) formulates that access decisions are based on the roles that individual users have as members of a system. In RBAC, there are role hierarchies in which a senior role inherits the permissions of a junior role. In order to allow a junior role to perform one or more tasks of a senior role, various delegation models have been proposed in the literature, including Role-Based Access Control Model (RBAC96), Role-Based Delegation Model (RBDM0)
Style APA, Harvard, Vancouver, ISO itp.
3

Wang, Frank Yi-Fei. "Cryptographically enforced access control for user data in untrusted clouds." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/103669.

Pełny tekst źródła
Streszczenie:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 55-60).<br>Modern web services rob users of low-level control over cloud storage; a user's single logical data set is scattered across multiple storage silos whose access controls are set by the web services, not users. The res
Style APA, Harvard, Vancouver, ISO itp.
4

Low, Marie Rose. "Self defence in open systems : protecting and sharing resources in a distributed open environment." Thesis, University of Hertfordshire, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241623.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Chuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.

Pełny tekst źródła
Streszczenie:
Whitelisting IP addresses and hostnames allow organizations to employ a default-deny approach to network traffic. Organizations employing a default-deny approach can stop many malicious threats, even including zero-day attacks, because it only allows explicitly stated legitimate activities. However, creating a comprehensive whitelist for a default-deny approach is difficult due to user-supplied destinations that can only be known at the time of usage. Whitelists, therefore, interfere with user experience by denying network traffic to user-supplied legitimate destinations. In this thesis, we fo
Style APA, Harvard, Vancouver, ISO itp.
6

Shaw, David. "Development of a model for smart card based access control in multi-user, multi-resource, multi-level access systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1999. https://ro.ecu.edu.au/theses/1229.

Pełny tekst źródła
Streszczenie:
The primary focus of this research is an examination of the issues involved in the granting of access in an environment characterised by multiple users, multiple resources and multiple levels of access permission. Increasing levels of complexity in automotive systems provides opportunities for improving the integration and efficiency of the services provided to the operator. The vehicle lease / hire environment provided a basis for evaluating conditional access to distributed, mobile assets where the principal medium for operating in this environment is the Smart Card. The application of Smart
Style APA, Harvard, Vancouver, ISO itp.
7

Beattie, Diane Lynn. "The informational needs of historians researching women : an archival user study." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26047.

Pełny tekst źródła
Streszczenie:
This thesis examines the informational needs of historians researching women as a subject in archives. The research methodology employed combines two types of user studies, the questionnaire and the reference analysis, in order to determine both the use and usefulness of archival materials and finding aids for historians researching women. This study begins with an overview of the literature on user studies. The thesis then outlines both the kinds of materials and the information historians researching women require. Finally, this study looks at the way historians researching women locate rele
Style APA, Harvard, Vancouver, ISO itp.
8

Bhamidipati, Venkata Ramana Murthy. "Architectures and models for administration of user-role assignment in role based access control." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3357.

Pełny tekst źródła
Streszczenie:
Thesis (Ph.D.)--George Mason University, 2008.<br>Vita: p. 99. Thesis directors: Ravi Sandhu, Daniel Menascé. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed Jan. 8, 2009). Includes bibliographical references (p. 94-98). Also issued in print.
Style APA, Harvard, Vancouver, ISO itp.
9

Maw, Htoo Aung. "A trust-based adaptive access control model for wireless sensor networks." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16564.

Pełny tekst źródła
Streszczenie:
Wireless Sensor Networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. One emerging application for WSNs involves their use in healthcare where they are generally termed Wireless Medical Sensor Networks (WMSNs). In a hospital, fitting patients with tiny, wearable, wireless vital sign sensors would allow doctors, nurses and others to continuously monitor the state of those in their care. In the healthcare industry, patients are expected to be treated in reasonable time and any loss in data availability can result in further d
Style APA, Harvard, Vancouver, ISO itp.
10

Deas, Matthew Burns. "Towards a user centric model for identity and access management within the online environment." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/775.

Pełny tekst źródła
Streszczenie:
Today, one is expected to remember multiple user names and passwords for different domains when one wants to access on the Internet. Identity management seeks to solve this problem through creating a digital identity that is exchangeable across organisational boundaries. Through the setup of collaboration agreements between multiple domains, users can easily switch across domains without being required to sign in again. However, use of this technology comes with risks of user identity and personal information being compromised. Criminals make use of spoofed websites and social engineering tech
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Książki na temat "User Access Control"

1

Corporation, Quarterdeck. Procomm RapidRemote: User guide. Quarterdeck, 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Jasper, Kim. User access & information protection: Managing open access & information protection. PROJECT CONSULT, 2002.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Helme, Arne. A system for secure user-controlled electronic transactions. Shaker Publishing, 1997.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Todorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Rodrigues, Charmaine. Karnataka Right to Information Act, 2000: A user guide. Edited by Muralidharan Y. G, Daruwala Maja, Nayak Venkatesh, Commonwealth Human Rights Initiative, Consumer Rights Education & Awareness Trust (Bangalore, India), and Karnataka (India). Commonwealth Human Rights Initiative, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Parker, Philip M. The 2009-2014 world outlook for user account provisioning technologies. Icon Group International, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Conference, Uniwersytet Jagielloński Instytut Bibliotekoznawstwa i. Informacji Naukowej International. Użytkownicy informacji elektronicznej. Wydawn. Uniwersytetu Jagiellońskiego, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

United States. Congress. House. Committee on Ways and Means. Subcommittee on Trade and United States. Congress. Senate. Committee on Finance, eds. Customs service: Passenger user fee collection needs to be reevaluated : report to the Committee on Finance, U.S. Senate, and Subcommittee on Trade, Committee on Ways and Means, House of Representatives. The Office, 1995.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Held, Gilbert. Netware login scripts: The productivity tool for administrators and users. McGraw-Hill, 1996.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Johnson, Maritza Lupe. Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings. [publisher not identified], 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Części książek na temat "User Access Control"

1

Mahalle, Parikshit N., Shashikant S. Bhong, and Gitanjali R. Shinde. "User-Managed Access." In Authorization and Access Control. CRC Press, 2022. http://dx.doi.org/10.1201/9781003268482-4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Sánchez, M., B. Jiménez, F. L. Gutièrrez, P. Paderewski, and J. L. Isla. "Access Control Model for Collaborative Business Processes." In Engineering the User Interface. Springer London, 2008. http://dx.doi.org/10.1007/978-1-84800-136-7_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Amor, Selma Belhadj, and Samir M. Perlaza. "Decentralized K-User Gaussian Multiple Access Channels." In Network Games, Control, and Optimization. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-51034-7_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Wang, Haodong, and Qun Li. "Distributed User Access Control in Sensor Networks." In Distributed Computing in Sensor Systems. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11776178_19.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Shehab, Mohamed, Anna Cinzia Squicciarini, and Gail-Joon Ahn. "Beyond User-to-User Access Control for Online Social Networks." In Information and Communications Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88625-9_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Liu, Xiaofan, Natasha Alechina, and Brian Logan. "Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38033-4_17.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Chinaei, Amir H., and Frank Wm Tompa. "User-Managed Access Control for Health Care Systems." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11552338_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Planas, Elena, Salvador Martínez, Marco Brambilla, and Jordi Cabot. "Towards Access Control Models for Conversational User Interfaces." In Enterprise, Business-Process and Information Systems Modeling. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07475-2_21.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Sobieski, Ścibor, and Bartosz Zieliński. "User Stories and Parameterized Role Based Access Control." In Model and Data Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23781-7_25.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

González-Manzano, Lorena, Ana I. González-Tablas, José M. de Fuentes, and Arturo Ribagorda. "User-Managed Access Control in Web Based Social Networks." In Lecture Notes in Social Networks. Springer Vienna, 2013. http://dx.doi.org/10.1007/978-3-7091-0894-9_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "User Access Control"

1

Cao, Kai, and Zhe Wang. "Fine-Grained Access Control System for Multi-User Environments." In 2024 4th International Signal Processing, Communications and Engineering Management Conference (ISPCEM). IEEE, 2024. https://doi.org/10.1109/ispcem64498.2024.00096.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Wang, Xiao, Yunchuan Guo, Mingjie Yu, Ziyan Zhou, Liang Fang, and Fenghua Li. "Custominer: Mining Customized Access Control Policies under User-Defined Constraints." In 2024 IEEE International Conference on High Performance Computing and Communications (HPCC). IEEE, 2024. https://doi.org/10.1109/hpcc64274.2024.00191.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Su, Linying. "User Behaviour Based Access Control Decision." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.349.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Xudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, and Dong Xuan. "DiffUser: Differentiated user access control on smartphones." In 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, 2009. http://dx.doi.org/10.1109/mobhoc.2009.5337017.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Xu, Fei, Jingsha He, Xu Wu, and Jing Xu. "A User-Centric Privacy Access Control Model." In 2010 2nd International Symposium on Information Engineering and Electronic Commerce (IEEC). IEEE, 2010. http://dx.doi.org/10.1109/ieec.2010.5533251.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Whalen, Tara, Diana Smetters, and Elizabeth F. Churchill. "User experiences with sharing and access control." In CHI '06 extended abstracts. ACM Press, 2006. http://dx.doi.org/10.1145/1125451.1125729.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Yang-Yang Li, Leon Yen, and Elvino S. Sousa. "Hybrid user access control in HSDPA femtocells." In 2010 IEEE Globecom Workshops (GC'10). IEEE, 2010. http://dx.doi.org/10.1109/glocomw.2010.5700407.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Thomas, Jacques, Federica Paci, Elisa Bertino, and Patrick Eugster. "User Tasks and Access Control overWeb Services." In IEEE International Conference on Web Services (ICWS 2007). IEEE, 2007. http://dx.doi.org/10.1109/icws.2007.182.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Zhu, Rui, Changguo Guo, Huaimin Wang, and Hailin Gong. "A User Trustworthiness Based Lightweight Access Control." In 2008 9th International Conference for Young Computer Scientists (ICYCS). IEEE, 2008. http://dx.doi.org/10.1109/icycs.2008.432.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Stavrakakis, I., and D. Kazakos. "A non-homogeneous user population multi-user random access communication system." In 26th IEEE Conference on Decision and Control. IEEE, 1987. http://dx.doi.org/10.1109/cdc.1987.272461.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "User Access Control"

1

Long, A. C., Courtney Moskowitz, and Greg Ganger. A Prototype User Interface for Coarse-Grained Desktop Access Control. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada488514.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Narayan, K., and D. Nelson. Using Authentication, Authorization, and Accounting Services to Dynamically Provision View-Based Access Control Model User-to-Group Mappings. Edited by R. Presuhn. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6065.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Brown, Dustin, Matthew Hiett, Samantha Cook, Dylan Pasley, Melissa Pham, and Sandra LeGrand. Rotorcraft Resupply Site Selection (RRSS) v1.0 and the USACE Model Interface Platform (UMIP) : documentation and user’s guide. Engineer Research and Development Center (U.S.), 2023. http://dx.doi.org/10.21079/11681/47908.

Pełny tekst źródła
Streszczenie:
This research effort aimed to create an operational prototype of the Geomorphic Oscillation Assessment Tool (GOAT) v1.0, developed by the US Army Engineer Research and Development Center, as a part of the US Army Corps of Engineers’ Model Interface Platform (UMIP). This platform is a web-based software that allows for easy and rapid construction and deployment of spatial planning and analysis capabilities. The prototype tool in UMIP represents the science embedded in GOAT while providing a user-friendly interface for interaction and spatially referenced result viewing. It also includes user ac
Style APA, Harvard, Vancouver, ISO itp.
4

Baena Olabe, Paloma, and Juan Cruz Vieyra. Access to Information and Targeted Transparency Policies. Inter-American Development Bank, 2011. http://dx.doi.org/10.18235/0009022.

Pełny tekst źródła
Streszczenie:
This paper contributes to the debate around why and how access to information can be used to prevent and control corruption. Access to information can not only bring corruption cases to light, it can also be a fundamental tool for its prevention and control, given that it encourages the creation of channels of participation and helps to identify vulnerabilities in both the public and the private sectors that might become windows of opportunity for corrupt practices. The paper`s conceptual framework explains how initiatives aimed at promoting access to information that are based on the concept
Style APA, Harvard, Vancouver, ISO itp.
5

Crooks, Roderic. Toward People’s Community Control of Technology: Race, Access, and Education. Social Science Research Council, 2022. http://dx.doi.org/10.35650/jt.3015.d.2022.

Pełny tekst źródła
Streszczenie:
This field review explores how the benefits of access to computing for racialized and minoritized communities has become an accepted fact in policy and research, despite decades of evidence that technical fixes do not solve the kinds of complex social problems that disproportionately affect these communities. I use the digital divide framework—a 1990s policy diagnosis that argues that the growth and success of the internet would bifurcate the public into digital “haves” and “have-nots”—as a lens to look at why access to computing frequently appears as a means to achieve economic, political, an
Style APA, Harvard, Vancouver, ISO itp.
6

Zeilenga, K. The Lightweight Directory Access Protocol (LDAP) Don't Use Copy Control. RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6171.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Adair, Mike, and OGC Portal Admin. Access Control and Terms of Use (ToU) "Click-through" IPR Management. Open Geospatial Consortium, Inc., 2006. http://dx.doi.org/10.62973/05-111r2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

MacGregor, W. I., K. Mehta, D. A. Cooper, and K. A. Scarfone. A recommendation for the use of PIV credentials in Physical Access Control Systems (PACS). National Institute of Standards and Technology, 2008. http://dx.doi.org/10.6028/nist.sp.800-116.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Poole, Joseph, John Barkley, Kevin Brady, Anthony Cincotta, and Wayne Salamon. Distributed communication methods and role-based access control for use in health care applications. National Institute of Standards and Technology, 1996. http://dx.doi.org/10.6028/nist.ir.5820.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Eslava, Marcela, Alessandro Maffioli, and Marcela Meléndez Arjona. Second-tier Government Banks and Access to Credit: Micro-Evidence from Colombia. Inter-American Development Bank, 2012. http://dx.doi.org/10.18235/0011364.

Pełny tekst źródła
Streszczenie:
Government-owned development banks have often been justified by the need to respond to financial market imperfections that hinder the establishment and growth of promising businesses, and as a result, stifle economic development more generally. However, evidence on the effectiveness of these banks in mitigating financial constraints is still lacking. To fill this gap, this paper analyzes the impact of Bancoldex, Colombia's publicly owned development bank, on access to credit. It uses a unique dataset that contains key characteristics of all loans issued to businesses in Colombia, including the
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!