Artykuły w czasopismach na temat „User Access Control”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „User Access Control”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Jawed Khan, Aakib, and Shabana Mehfuz. "Fuzzy User Access Trust Model for Cloud Access Control." Computer Systems Science and Engineering 44, no. 1 (2023): 113–28. http://dx.doi.org/10.32604/csse.2023.023378.
Pełny tekst źródłaDanilescu, Marcel. "MODELING ACCESS CONTROL AND USER ACTIONS USING TRUST - BASED ACCESS CONTROL POLICIES." Journal of Social Sciences III (3) (September 1, 2020): 72–84. https://doi.org/10.5281/zenodo.3971967.
Pełny tekst źródłaKim, Dongmin, and Heeyoul Kim. "User-Centric Access Control for Android Platform." Journal of Korean Institute of Information Technology 13, no. 5 (2015): 49. http://dx.doi.org/10.14801/jkiit.2015.13.5.49.
Pełny tekst źródłaHarn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.
Pełny tekst źródłaKumar, Devender, Sai Kishore Pachigolla, Shubham Singh Manhas, and Karan Rawat. "PUF-based user access control scheme for IoT environment." Journal of Information and Optimization Sciences 44, no. 7 (2023): 1347–64. http://dx.doi.org/10.47974/jios-1321.
Pełny tekst źródłaRussell, D. "Access Control Techniques and Their Impact on User Accessibility in Computer Networks." SIJ Transactions on Computer Networks & Communication Engineering 7, no. 5 (2019): 16–19. http://dx.doi.org/10.9756/sijcnce/v7i5/07051014.
Pełny tekst źródłaWang, Haodong, and Qun Li. "Achieving distributed user access control in sensor networks." Ad Hoc Networks 10, no. 3 (2012): 272–83. http://dx.doi.org/10.1016/j.adhoc.2011.01.011.
Pełny tekst źródłaWang, Huaxia, Yu-Dong Yao, Xin Zhang, and Hongbin Li. "Secondary User Access Control in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 34, no. 11 (2016): 2866–73. http://dx.doi.org/10.1109/jsac.2016.2615262.
Pełny tekst źródłaDanilescu, Marcel, and Victor Beșliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII (2) (June 16, 2021): 67–78. https://doi.org/10.52326/jes.utm.2021.28(2).05.
Pełny tekst źródłaLi, Zhiyuan, Li Chen, and Weidong Wang. "Stochastic Downlink Power Control for Various User Requirements." IEEE Access 8 (2020): 8899–912. http://dx.doi.org/10.1109/access.2019.2963196.
Pełny tekst źródłaWang, Huaxia, Yu-Dong Yao, and Shengliang Peng. "Prioritized Secondary User Access Control in Cognitive Radio Networks." IEEE Access 6 (2018): 11007–16. http://dx.doi.org/10.1109/access.2018.2811341.
Pełny tekst źródłaLi, Songnong, Yao Yan, Yongliang Ji, Wenxin Peng, Lingyun Wan, and Puning Zhang. "Preference-Aware User Access Control Policy in Internet of Things." Sensors 23, no. 13 (2023): 5989. http://dx.doi.org/10.3390/s23135989.
Pełny tekst źródłaPaurav, Goel, Singh Avtar, and Goel Ashok. "Transmit power control and data rate enhancement in cognitive radio network using computational intelligence." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 2 (2022): 1602–16. https://doi.org/10.11591/ijece.v12i2.pp1602-1616.
Pełny tekst źródłaMéry, Dominique, and Stephan Merz. "Specification and Refinement of Access Control." JUCS - Journal of Universal Computer Science 13, no. (8) (2007): 1073–93. https://doi.org/10.3217/jucs-013-08-1073.
Pełny tekst źródłaKhuntia, Sucharita. "Secure Attribute-based User Access Control over AWS Cloud." International Journal for Research in Applied Science and Engineering Technology 9, no. 2 (2021): 7–33. http://dx.doi.org/10.22214/ijraset.2021.32950.
Pełny tekst źródłaOh, Soo-Hyun, and Sun-Ki Eun. "Remote user Access control Mechanism in Smart Grid environments." Transactions of The Korean Institute of Electrical Engineers 60, no. 2 (2011): 416–22. http://dx.doi.org/10.5370/kiee.2011.60.2.416.
Pełny tekst źródłaZerkouk, Meriem, Abdallah Mhamed, and Belhadri Messabih. "A User Profile Based Access Control Model and Architecture." International journal of Computer Networks & Communications 5, no. 1 (2013): 171–81. http://dx.doi.org/10.5121/ijcnc.2013.5112.
Pełny tekst źródłaSastry, JKR. "Implementing User defined Attribute and Policy based Access Control." International Journal of Emerging Trends in Engineering Research 8, no. 7 (2020): 3986–93. http://dx.doi.org/10.30534/ijeter/2020/171872020.
Pełny tekst źródłaNam-Yih Lee. "Integrating access control with user authentication using smart cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 943–48. http://dx.doi.org/10.1109/30.920444.
Pełny tekst źródłaIyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. http://dx.doi.org/10.59324/ejaset.2024.2(3).18.
Pełny tekst źródłaSpitzer, Stephan. "Better Control of User Web Access of Electronic Resources." Journal of Electronic Resources in Medical Libraries 6, no. 2 (2009): 91–100. http://dx.doi.org/10.1080/15424060902931997.
Pełny tekst źródłaKavuri, Satheesh, GangadharaRao Kancharla, and Basaveswara Rao Bobba. "Attribute Based User Control Access for Cloud Storage Data." International Journal of Computer Trends and Technology 11, no. 5 (2014): 193–97. http://dx.doi.org/10.14445/22312803/ijctt-v11p141.
Pełny tekst źródłaZheng, Xiao-lin, Yu Lei, and De-ren Chen. "Research of user access control for networked manufacturing system." Frontiers of Electrical and Electronic Engineering in China 1, no. 4 (2006): 465–69. http://dx.doi.org/10.1007/s11460-006-0089-x.
Pełny tekst źródłaIyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. https://doi.org/10.59324/ejaset.2024.2(3).18.
Pełny tekst źródłaStankovski, Stevan, Gordana Ostojic, Nikola Djukic, Srdjan Tegeltija, and Aleksandar Milojkovic. "Bluetooth parking access control." Sensor Review 34, no. 3 (2014): 244–54. http://dx.doi.org/10.1108/sr-06-2012-643.
Pełny tekst źródłaO'Shea, G. "Controlling the Dependency of User Access Control Mechanisms on Correctness of User Identification." Computer Journal 31, no. 6 (1988): 503–9. http://dx.doi.org/10.1093/comjnl/31.6.503.
Pełny tekst źródłaCheng, Yuan, Jaehong Park, and Ravi Sandhu. "An Access Control Model for Online Social Networks Using User-to-User Relationships." IEEE Transactions on Dependable and Secure Computing 13, no. 4 (2016): 424–36. http://dx.doi.org/10.1109/tdsc.2015.2406705.
Pełny tekst źródłaWang, Yan, Liqin Tian, and Zhenguo Chen. "Game Analysis of Access Control Based on User Behavior Trust." Information 10, no. 4 (2019): 132. http://dx.doi.org/10.3390/info10040132.
Pełny tekst źródłaOvabor, Kelvin, and Travis Atkison. "User-Centric Privacy Control in Identity Management and Access Control within Cloud-Based Systems." International Journal on Cybernetics & Informatics 12, no. 7 (2023): 59–71. http://dx.doi.org/10.5121/ijci.2023.120705.
Pełny tekst źródłaJunquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Pełny tekst źródłaPenelova, Maria. "Access Control Models." Cybernetics and Information Technologies 21, no. 4 (2021): 77–104. http://dx.doi.org/10.2478/cait-2021-0044.
Pełny tekst źródłaNaranjo, Juan Álvaro Muñoz, Pablo Orduña, Aitor Gómez-Goiri, Diego López-De-Ipiña, and Leocadio Casado. "Enabling User Access Control in Energy-constrained Wireless Smart Environments." JUCS - Journal of Universal Computer Science 19, no. (17) (2013): 2490–502. https://doi.org/10.3217/jucs-019-17-2490.
Pełny tekst źródłaWu, Yi, Wei Zhang, Hu Xiong, Zhiguang Qin, and Kuo-Hui Yeh. "Efficient access control with traceability and user revocation in IoT." Multimedia Tools and Applications 80, no. 20 (2021): 31487–508. http://dx.doi.org/10.1007/s11042-021-11286-0.
Pełny tekst źródłaMcIntosh, Timothy, A. S. M. Kayes, Yi-Ping Phoebe Chen, Alex Ng, and Paul Watters. "Dynamic user-centric access control for detection of ransomware attacks." Computers & Security 111 (December 2021): 102461. http://dx.doi.org/10.1016/j.cose.2021.102461.
Pełny tekst źródłaQi, Haojin, Yong Wang, Yueping Yang, Xiaodie Yu, and Xiaoming Ju. "Access control mechanism based on image recognition and user level." Journal of Physics: Conference Series 1453 (January 2020): 012102. http://dx.doi.org/10.1088/1742-6596/1453/1/012102.
Pełny tekst źródłaYen, Sung-Ming, and Chi-Sung Laih. "The design of dynamic access control scheme with user authentication." Computers & Mathematics with Applications 25, no. 7 (1993): 27–32. http://dx.doi.org/10.1016/0898-1221(93)90309-j.
Pełny tekst źródłaChung, Yu Fang, Hsiu Hui Lee, Feipei Lai, and Tzer Shyong Chen. "Access control in user hierarchy based on elliptic curve cryptosystem." Information Sciences 178, no. 1 (2008): 230–43. http://dx.doi.org/10.1016/j.ins.2007.08.001.
Pełny tekst źródłaS, Nilesh. "ExHABE with User Accountability for Secure Access Control in Cloud." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 4 (2015): 1848–53. http://dx.doi.org/10.17762/ijritcc2321-8169.150424.
Pełny tekst źródłaJaya Prakash, S., K. Varada Raj Kumar, and Deepak Nedunuri. "Dynamic security for multi-user access control in distributed environment." Journal of Physics: Conference Series 1228 (May 2019): 012016. http://dx.doi.org/10.1088/1742-6596/1228/1/012016.
Pełny tekst źródłaJing, Xu, Zhengnan Liu, Shuqin Li, Bin Qiao, and Gexu Tan. "A cloud-user behavior assessment based dynamic access control model." International Journal of System Assurance Engineering and Management 8, S3 (2015): 1966–75. http://dx.doi.org/10.1007/s13198-015-0411-1.
Pełny tekst źródłaSolanke, Vivek. "Secure Deduplication with User-Defined Access Control in Cloud Storage." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 394–400. http://dx.doi.org/10.22214/ijraset.2023.53650.
Pełny tekst źródłaGómez-Marín, Ernesto, Davide Martintoni, Valerio Senni, Encarnación Castillo, and Luis Parrilla. "Fine-Grained Access Control with User Revocation in Smart Manufacturing." Electronics 12, no. 13 (2023): 2843. http://dx.doi.org/10.3390/electronics12132843.
Pełny tekst źródłaYaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures." Information Resources Management Journal 30, no. 4 (2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.
Pełny tekst źródłaIkponmwosa, Oghogho, Otuagoma S., Ufuoma Jeffrey Okieke, et al. "FACE RECOGNITION SYSTEM FOR AUTOMATIC DOOR ACCESS CONTROL." Engineering and Technology Journal 08, no. 02 (2023): 1981–85. http://dx.doi.org/10.47191/etj/v8i2.03.
Pełny tekst źródłaPeeters, Roel, Dave Singelée, and Bart Preneel. "Threshold-Based Location-Aware Access Control." International Journal of Handheld Computing Research 2, no. 3 (2011): 22–37. http://dx.doi.org/10.4018/jhcr.2011070102.
Pełny tekst źródłaWang, Min, Hui Gao, and Tiejun Lv. "Energy-Efficient User Association and Power Control in the Heterogeneous Network." IEEE Access 5 (2017): 5059–68. http://dx.doi.org/10.1109/access.2017.2690305.
Pełny tekst źródłaKaushik, Shweta, and Charu Gandhi. "Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud." International Journal of Information Security and Privacy 15, no. 2 (2021): 29–52. http://dx.doi.org/10.4018/ijisp.2021040102.
Pełny tekst źródłaVeena, Devi Shastrimath V., Andrea Olivero Ashwini, and Bhat Deepa. "Railway Access Control System using Face Recognition." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 3 (2020): 444–48. https://doi.org/10.35940/ijrte.C4570.099320.
Pełny tekst źródłaM., Menaka, and Meenakshisundaram K. "10.11591/ijece.v8i5.pp3187-3193." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3187–93. https://doi.org/10.11591/ijece.v8i5.pp3187-3193.
Pełny tekst źródłaKordov, Krasimir, and Ismail Bilyal. "Access control system using Arduino microcontroller and RFID reader." Annual of Konstantin Preslavsky University of Shumen, Faculty of mathematics and informatics XXIV C (2023): 9–15. http://dx.doi.org/10.46687/qsfy7970.
Pełny tekst źródła