Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: User Access Control.

Artykuły w czasopismach na temat „User Access Control”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „User Access Control”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Jawed Khan, Aakib, and Shabana Mehfuz. "Fuzzy User Access Trust Model for Cloud Access Control." Computer Systems Science and Engineering 44, no. 1 (2023): 113–28. http://dx.doi.org/10.32604/csse.2023.023378.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Danilescu, Marcel. "MODELING ACCESS CONTROL AND USER ACTIONS USING TRUST - BASED ACCESS CONTROL POLICIES." Journal of Social Sciences III (3) (September 1, 2020): 72–84. https://doi.org/10.5281/zenodo.3971967.

Pełny tekst źródła
Streszczenie:
This paper is a natural continuation of previous research on the implementation of confidentiality in small, medium, and virtual enterprises. This research began in 2009, with the work "Xml Based Techniques for Data Privacy in E-Business" which revealed that for small, medium, and virtual enterprises that often represent start-ups, trust is a basic element. Thus, in 2010, we published the paper "Control access to information by applying policies based on trust hierarchies". Present work shows a method of modeling the hierarchies of trust in computer systems. After a review
Style APA, Harvard, Vancouver, ISO itp.
3

Kim, Dongmin, and Heeyoul Kim. "User-Centric Access Control for Android Platform." Journal of Korean Institute of Information Technology 13, no. 5 (2015): 49. http://dx.doi.org/10.14801/jkiit.2015.13.5.49.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Harn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Kumar, Devender, Sai Kishore Pachigolla, Shubham Singh Manhas, and Karan Rawat. "PUF-based user access control scheme for IoT environment." Journal of Information and Optimization Sciences 44, no. 7 (2023): 1347–64. http://dx.doi.org/10.47974/jios-1321.

Pełny tekst źródła
Streszczenie:
A very important part of any software or hardware associated with the Internet of Things (IoT) is the User Access Control. User Access Control deals with the important security features like authenticating a legitimate user, authorizing a user, etc. A very effective and secure way to ensure the user access control is: three factor user access control. Some three factor user authentication schemes have been developed in the past, brief details regarding them can be found in further sections of the paper. In this paper, we propose a new three factor user access control scheme. Our proposed schem
Style APA, Harvard, Vancouver, ISO itp.
6

Russell, D. "Access Control Techniques and Their Impact on User Accessibility in Computer Networks." SIJ Transactions on Computer Networks & Communication Engineering 7, no. 5 (2019): 16–19. http://dx.doi.org/10.9756/sijcnce/v7i5/07051014.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Wang, Haodong, and Qun Li. "Achieving distributed user access control in sensor networks." Ad Hoc Networks 10, no. 3 (2012): 272–83. http://dx.doi.org/10.1016/j.adhoc.2011.01.011.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Wang, Huaxia, Yu-Dong Yao, Xin Zhang, and Hongbin Li. "Secondary User Access Control in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 34, no. 11 (2016): 2866–73. http://dx.doi.org/10.1109/jsac.2016.2615262.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Danilescu, Marcel, and Victor Beșliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII (2) (June 16, 2021): 67–78. https://doi.org/10.52326/jes.utm.2021.28(2).05.

Pełny tekst źródła
Streszczenie:
In recent decades, the number of researches on access control and user actions in computer systems has increased. Over time, there have been two models of implementing Mandatory Access Control (MAC) policies for government institutions and Discretionary Access Control (DAC) for the business environment, policies that various access control modeling solutions seek to implement. Among the access control modeling solutions developed are Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), presented in the U.S.A. by the National Institute of Standard and Technology (NIST). I
Style APA, Harvard, Vancouver, ISO itp.
10

Li, Zhiyuan, Li Chen, and Weidong Wang. "Stochastic Downlink Power Control for Various User Requirements." IEEE Access 8 (2020): 8899–912. http://dx.doi.org/10.1109/access.2019.2963196.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
11

Wang, Huaxia, Yu-Dong Yao, and Shengliang Peng. "Prioritized Secondary User Access Control in Cognitive Radio Networks." IEEE Access 6 (2018): 11007–16. http://dx.doi.org/10.1109/access.2018.2811341.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
12

Li, Songnong, Yao Yan, Yongliang Ji, Wenxin Peng, Lingyun Wan, and Puning Zhang. "Preference-Aware User Access Control Policy in Internet of Things." Sensors 23, no. 13 (2023): 5989. http://dx.doi.org/10.3390/s23135989.

Pełny tekst źródła
Streszczenie:
There are multiple types of services in the Internet of Things, and existing access control methods do not consider situations wherein the same types of services have multiple access options. In order to ensure the QoS quality of user access and realize the reasonable utilization of Internet of Things network resources, it is necessary to consider the characteristics of different services to design applicable access control strategies. In this paper, a preference-aware user access control strategy in slices is proposed, which can increase the number of users in the system while balancing slice
Style APA, Harvard, Vancouver, ISO itp.
13

Paurav, Goel, Singh Avtar, and Goel Ashok. "Transmit power control and data rate enhancement in cognitive radio network using computational intelligence." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 2 (2022): 1602–16. https://doi.org/10.11591/ijece.v12i2.pp1602-1616.

Pełny tekst źródła
Streszczenie:
Underutilized radio frequencies are the chief apprehension in advance radio communication. The radio recourses are sparse and costly and their efficient allocation has become a challenge. Cognitive radio networks are the ray of hope. Cognitive radio networks use dynamic spectrum access technique to opportunistically retrieve and share the licensed spectrum. The licensed users are called primary users and the users that opportunistically access the licensed spectrum all called secondary users. The proposed system is a feedback system that work on demand and supply concept, in which secondary re
Style APA, Harvard, Vancouver, ISO itp.
14

Méry, Dominique, and Stephan Merz. "Specification and Refinement of Access Control." JUCS - Journal of Universal Computer Science 13, no. (8) (2007): 1073–93. https://doi.org/10.3217/jucs-013-08-1073.

Pełny tekst źródła
Streszczenie:
We consider the extension of fair event system specifications by concepts of access control (prohibitions, user rights, and obligations). We give proof rules for verifying that an access control policy is correctly implemented in a system, and consider preservation of access control by refinement of event systems. Prohibitions and obligations are expressed as properties of traces and are preserved by standard refinement notions of event systems. Preservation of user rights is not guaranteed by construction; we propose to combine implementation-level user rights and obligations to implement hig
Style APA, Harvard, Vancouver, ISO itp.
15

Khuntia, Sucharita. "Secure Attribute-based User Access Control over AWS Cloud." International Journal for Research in Applied Science and Engineering Technology 9, no. 2 (2021): 7–33. http://dx.doi.org/10.22214/ijraset.2021.32950.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Oh, Soo-Hyun, and Sun-Ki Eun. "Remote user Access control Mechanism in Smart Grid environments." Transactions of The Korean Institute of Electrical Engineers 60, no. 2 (2011): 416–22. http://dx.doi.org/10.5370/kiee.2011.60.2.416.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Zerkouk, Meriem, Abdallah Mhamed, and Belhadri Messabih. "A User Profile Based Access Control Model and Architecture." International journal of Computer Networks & Communications 5, no. 1 (2013): 171–81. http://dx.doi.org/10.5121/ijcnc.2013.5112.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Sastry, JKR. "Implementing User defined Attribute and Policy based Access Control." International Journal of Emerging Trends in Engineering Research 8, no. 7 (2020): 3986–93. http://dx.doi.org/10.30534/ijeter/2020/171872020.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Nam-Yih Lee. "Integrating access control with user authentication using smart cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 943–48. http://dx.doi.org/10.1109/30.920444.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Iyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. http://dx.doi.org/10.59324/ejaset.2024.2(3).18.

Pełny tekst źródła
Streszczenie:
Safeguarding digital and physical premises against unauthorized entry is increasingly crucial in an era characterized by fast technological advancements and escalating security risks. Biometric security devices for controlling entry employ distinct form and behavioral attributes to authenticate persons and regulate access, hence offering innovative solutions. This paper offers a comprehensive review of the utilization of fingerprint recognition methods in the creation of an entry authorization device with biometrics. The material and methods section provides a detailed description of the hardw
Style APA, Harvard, Vancouver, ISO itp.
21

Spitzer, Stephan. "Better Control of User Web Access of Electronic Resources." Journal of Electronic Resources in Medical Libraries 6, no. 2 (2009): 91–100. http://dx.doi.org/10.1080/15424060902931997.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
22

Kavuri, Satheesh, GangadharaRao Kancharla, and Basaveswara Rao Bobba. "Attribute Based User Control Access for Cloud Storage Data." International Journal of Computer Trends and Technology 11, no. 5 (2014): 193–97. http://dx.doi.org/10.14445/22312803/ijctt-v11p141.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Zheng, Xiao-lin, Yu Lei, and De-ren Chen. "Research of user access control for networked manufacturing system." Frontiers of Electrical and Electronic Engineering in China 1, no. 4 (2006): 465–69. http://dx.doi.org/10.1007/s11460-006-0089-x.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Iyen, Cookey, Abel Jacob, and Ayoola Oluwasegun. "Development of Biometric User Identification and Access Control System." European Journal of Applied Science, Engineering and Technology 2, no. 3 (2024): 194–204. https://doi.org/10.59324/ejaset.2024.2(3).18.

Pełny tekst źródła
Streszczenie:
Safeguarding digital and physical premises against unauthorized entry is increasingly crucial in an era characterized by fast technological advancements and escalating security risks. Biometric security devices for controlling entry employ distinct form and behavioral attributes to authenticate persons and regulate access, hence offering innovative solutions. This paper offers a comprehensive review of the utilization of fingerprint recognition methods in the creation of an entry authorization device with biometrics. The material and methods section provides a detailed description of the hardw
Style APA, Harvard, Vancouver, ISO itp.
25

Stankovski, Stevan, Gordana Ostojic, Nikola Djukic, Srdjan Tegeltija, and Aleksandar Milojkovic. "Bluetooth parking access control." Sensor Review 34, no. 3 (2014): 244–54. http://dx.doi.org/10.1108/sr-06-2012-643.

Pełny tekst źródła
Streszczenie:
Purpose – The purpose of this paper is to describe an approach of using mobile phones with Bluetooth technology to enter/exit restricted area. Design/methodology/approach – Applied Bluetooth technology implemented in mobile phones enables the user to perform the identification and the state of presence while entering/exiting the parking space without stopping the vehicle. For the successful implementation of this method for presence detection and proper identification, it is necessary to determine the values of the Bluetooth signal. Findings – This paper discuses a case study that has been don
Style APA, Harvard, Vancouver, ISO itp.
26

O'Shea, G. "Controlling the Dependency of User Access Control Mechanisms on Correctness of User Identification." Computer Journal 31, no. 6 (1988): 503–9. http://dx.doi.org/10.1093/comjnl/31.6.503.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Cheng, Yuan, Jaehong Park, and Ravi Sandhu. "An Access Control Model for Online Social Networks Using User-to-User Relationships." IEEE Transactions on Dependable and Secure Computing 13, no. 4 (2016): 424–36. http://dx.doi.org/10.1109/tdsc.2015.2406705.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Wang, Yan, Liqin Tian, and Zhenguo Chen. "Game Analysis of Access Control Based on User Behavior Trust." Information 10, no. 4 (2019): 132. http://dx.doi.org/10.3390/info10040132.

Pełny tekst źródła
Streszczenie:
Due to the dynamics and uncertainty of the current network environment, access control is one of the most important factors in guaranteeing network information security. How to construct a scientific and accurate access control model is a current research focus. In actual access control mechanisms, users with high trust values bring better benefits, but the losses will also be greater once cheating access is adopted. A general access control game model that can reflect both trust and risk is established in this paper. First, we construct an access control game model with user behavior trust be
Style APA, Harvard, Vancouver, ISO itp.
29

Ovabor, Kelvin, and Travis Atkison. "User-Centric Privacy Control in Identity Management and Access Control within Cloud-Based Systems." International Journal on Cybernetics & Informatics 12, no. 7 (2023): 59–71. http://dx.doi.org/10.5121/ijci.2023.120705.

Pełny tekst źródła
Streszczenie:
The ability to effectively implement user-centric privacy controls in cloud-based identity access management (IAM) systems is crucial in today's age of rapidly rising data and increased privacy concerns. The study tackles the scalability issue inside cloud-based IAM systems, where user-centric privacy controls are paramount. The study aims to guarantee effective system performance despite growing numbers of users and data items by following a carefully crafted approach that uses user-centric privacy algorithms. The findings are expected to increase scalability while maintaining security and us
Style APA, Harvard, Vancouver, ISO itp.
30

Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.

Pełny tekst źródła
Streszczenie:
Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know
Style APA, Harvard, Vancouver, ISO itp.
31

Penelova, Maria. "Access Control Models." Cybernetics and Information Technologies 21, no. 4 (2021): 77–104. http://dx.doi.org/10.2478/cait-2021-0044.

Pełny tekst źródła
Streszczenie:
Abstract Access control is a part of the security of information technologies. Access control regulates the access requests to system resources. The access control logic is formalized in models. Many access control models exist. They vary in their design, components, policies and areas of application. With the developing of information technologies, more complex access control models have been created. This paper is concerned with overview and analysis for a number of access control models. First, an overview of access control models is presented. Second, they are analyzed and compared by a nu
Style APA, Harvard, Vancouver, ISO itp.
32

Naranjo, Juan Álvaro Muñoz, Pablo Orduña, Aitor Gómez-Goiri, Diego López-De-Ipiña, and Leocadio Casado. "Enabling User Access Control in Energy-constrained Wireless Smart Environments." JUCS - Journal of Universal Computer Science 19, no. (17) (2013): 2490–502. https://doi.org/10.3217/jucs-019-17-2490.

Pełny tekst źródła
Streszczenie:
This work introduces a novel access control solution for wireless network services in Internet of Things scenarios. We focus on a minimal use of computation, energy and storage resources at wireless sensors so as to address constrained devices: the proposed methods for key distribution and access control rely on extremely fast key derivation functions and, for the same reason, memory usage is reduced since keys are computed on the fly when needed. Our solution achieves privacy, authentication, semantic security, low energy, low computational demand and impacts mitigation of compromised devices
Style APA, Harvard, Vancouver, ISO itp.
33

Wu, Yi, Wei Zhang, Hu Xiong, Zhiguang Qin, and Kuo-Hui Yeh. "Efficient access control with traceability and user revocation in IoT." Multimedia Tools and Applications 80, no. 20 (2021): 31487–508. http://dx.doi.org/10.1007/s11042-021-11286-0.

Pełny tekst źródła
Streszczenie:
AbstractWith the universality and availability of Internet of Things (IoT), data privacy protection in IoT has become a hot issue. As a branch of attribute-based encryption (ABE), ciphertext policy attribute-based encryption (CP-ABE) is widely used in IoT to offer flexible one-to-many encryption. However, in IoT, different mobile devices share messages collected, transmission of large amounts of data brings huge burdens to mobile devices. Efficiency is a bottleneck which restricts the wide application and adoption of CP-ABE in Internet of things. Besides, the decryption key in CP-ABE is shared
Style APA, Harvard, Vancouver, ISO itp.
34

McIntosh, Timothy, A. S. M. Kayes, Yi-Ping Phoebe Chen, Alex Ng, and Paul Watters. "Dynamic user-centric access control for detection of ransomware attacks." Computers & Security 111 (December 2021): 102461. http://dx.doi.org/10.1016/j.cose.2021.102461.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Qi, Haojin, Yong Wang, Yueping Yang, Xiaodie Yu, and Xiaoming Ju. "Access control mechanism based on image recognition and user level." Journal of Physics: Conference Series 1453 (January 2020): 012102. http://dx.doi.org/10.1088/1742-6596/1453/1/012102.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Yen, Sung-Ming, and Chi-Sung Laih. "The design of dynamic access control scheme with user authentication." Computers & Mathematics with Applications 25, no. 7 (1993): 27–32. http://dx.doi.org/10.1016/0898-1221(93)90309-j.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Chung, Yu Fang, Hsiu Hui Lee, Feipei Lai, and Tzer Shyong Chen. "Access control in user hierarchy based on elliptic curve cryptosystem." Information Sciences 178, no. 1 (2008): 230–43. http://dx.doi.org/10.1016/j.ins.2007.08.001.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

S, Nilesh. "ExHABE with User Accountability for Secure Access Control in Cloud." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 4 (2015): 1848–53. http://dx.doi.org/10.17762/ijritcc2321-8169.150424.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Jaya Prakash, S., K. Varada Raj Kumar, and Deepak Nedunuri. "Dynamic security for multi-user access control in distributed environment." Journal of Physics: Conference Series 1228 (May 2019): 012016. http://dx.doi.org/10.1088/1742-6596/1228/1/012016.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Jing, Xu, Zhengnan Liu, Shuqin Li, Bin Qiao, and Gexu Tan. "A cloud-user behavior assessment based dynamic access control model." International Journal of System Assurance Engineering and Management 8, S3 (2015): 1966–75. http://dx.doi.org/10.1007/s13198-015-0411-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

Solanke, Vivek. "Secure Deduplication with User-Defined Access Control in Cloud Storage." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 394–400. http://dx.doi.org/10.22214/ijraset.2023.53650.

Pełny tekst źródła
Streszczenie:
Abstract: Cloud storage is one of the most important services of cloud computing, offering significant benefits to users by allowing them to outsource their data for storage and sharing with authorized parties. Secure deduplication has been extensively researched in cloud storage, aiming to eliminate redundancy in encrypted data and reduce storage space. Our proposed solution focuses on uploading files to the cloud storage system. When a file is uploaded, it is checked to see if an identical file already exists. If a duplicate is found, the system displays an entry indicating that the file alr
Style APA, Harvard, Vancouver, ISO itp.
42

Gómez-Marín, Ernesto, Davide Martintoni, Valerio Senni, Encarnación Castillo, and Luis Parrilla. "Fine-Grained Access Control with User Revocation in Smart Manufacturing." Electronics 12, no. 13 (2023): 2843. http://dx.doi.org/10.3390/electronics12132843.

Pełny tekst źródła
Streszczenie:
Collaborative manufacturing is a key enabler of Industry 4.0 that requires secure data sharing among multiple parties. However, intercompany data-sharing raises important privacy and security concerns, particularly given intellectual property and business-sensitive information collected by many devices. In this paper, we propose a solution that combines four technologies to address these challenges: Attribute-Based Encryption for data access control, blockchain for data integrity and non-repudiation, Hardware Security Modules for authenticity, and the Interplanetary File System for data scalab
Style APA, Harvard, Vancouver, ISO itp.
43

Yaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures." Information Resources Management Journal 30, no. 4 (2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.

Pełny tekst źródła
Streszczenie:
Almost all computing systems and applications in organizations include some form of access control mechanisms. Managing secure access to computing resources is an important but a challenging task, requiring both administrative and technical measures. This study examines the influence of administrative access control measures on technical access control mechanisms. Based on the four access control clauses defined by ISO/IEC27002, this study develops a model to empirically test the impact of access control policies on systems and applications control activities. The study employs Partial Least S
Style APA, Harvard, Vancouver, ISO itp.
44

Ikponmwosa, Oghogho, Otuagoma S., Ufuoma Jeffrey Okieke, et al. "FACE RECOGNITION SYSTEM FOR AUTOMATIC DOOR ACCESS CONTROL." Engineering and Technology Journal 08, no. 02 (2023): 1981–85. http://dx.doi.org/10.47191/etj/v8i2.03.

Pełny tekst źródła
Streszczenie:
A face recognition system for automatic door access control has been developed in this work with a view to providing a relatively more robust and foolproof access control which can provide better security and reduce human errors inherent in other conventional methods. The system was designed with machine learning and artificial intelligence to capture faces, train faces with machine mode, and run trained faces to grant access to the user. The system uses the RaspberryPi module, camera module, servo motor and the GSM module which were all incorporated into the fabricated building to make up the
Style APA, Harvard, Vancouver, ISO itp.
45

Peeters, Roel, Dave Singelée, and Bart Preneel. "Threshold-Based Location-Aware Access Control." International Journal of Handheld Computing Research 2, no. 3 (2011): 22–37. http://dx.doi.org/10.4018/jhcr.2011070102.

Pełny tekst źródła
Streszczenie:
Designing a secure, resilient and user-friendly access control system is a challenging task. In this article, a threshold-based location-aware access control mechanism is proposed. This design uniquely combines the concepts of secret sharing and distance bounding protocols to tackle various security vulnerabilities. The proposed solution makes use of the fact that the user carries around various personal devices. This solution offers protection against any set of or fewer compromised user’s devices, with being an adjustable threshold number. It removes the single point of failure in the system
Style APA, Harvard, Vancouver, ISO itp.
46

Wang, Min, Hui Gao, and Tiejun Lv. "Energy-Efficient User Association and Power Control in the Heterogeneous Network." IEEE Access 5 (2017): 5059–68. http://dx.doi.org/10.1109/access.2017.2690305.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Kaushik, Shweta, and Charu Gandhi. "Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud." International Journal of Information Security and Privacy 15, no. 2 (2021): 29–52. http://dx.doi.org/10.4018/ijisp.2021040102.

Pełny tekst źródła
Streszczenie:
Cloud computing started a new era for IT enterprises. It allows the movement of application from local to remote location, massive data storage. Owner has access to centralized or decentralized data storage server, where data management handled by remote vendor. But, the heterogeneous and dynamic nature of cloud introduces security challenges. Among them, access control and integrity checking are most important which incur high consideration. Attribute-based encryption is one of the access control technique which allows integration of access policies, attributes, and encrypted data. In this pa
Style APA, Harvard, Vancouver, ISO itp.
48

Veena, Devi Shastrimath V., Andrea Olivero Ashwini, and Bhat Deepa. "Railway Access Control System using Face Recognition." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 3 (2020): 444–48. https://doi.org/10.35940/ijrte.C4570.099320.

Pełny tekst źródła
Streszczenie:
Nowadays booking tickets and getting inside a railway station is a difficult task. Manual checking becomes a burden and time consuming. Also as everything is getting digitized in this modern world introduce face recognition and Quick Response (QR) code system for entry helps in passenger convenience. Face recognition is a method of identifying or verifying the identity of an individual using their face. Face recognition systems can be used to identify people in photos, video, or in real-time. So this system focuses on passengers’ convenience through allowing them to book tickets online a
Style APA, Harvard, Vancouver, ISO itp.
49

M., Menaka, and Meenakshisundaram K. "10.11591/ijece.v8i5.pp3187-3193." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3187–93. https://doi.org/10.11591/ijece.v8i5.pp3187-3193.

Pełny tekst źródła
Streszczenie:
To be able to leverage big data to achieve enhanced strategic insight and make informed decision, an efficient access control mechanism is needed for ensuring end to end security of such information asset. Attribute Based Access Control (ABAC), Role Based Access Control (RBAC) and Event Based Access Control (EBAC) are widely used access control mechanisms. The ABAC system is much more complex in terms of policy reviews, hence analyzing the policy and reviewing or changing user permission are quite complex task. RBAC system is labor intensive and time consuming to build a model instance and it
Style APA, Harvard, Vancouver, ISO itp.
50

Kordov, Krasimir, and Ismail Bilyal. "Access control system using Arduino microcontroller and RFID reader." Annual of Konstantin Preslavsky University of Shumen, Faculty of mathematics and informatics XXIV C (2023): 9–15. http://dx.doi.org/10.46687/qsfy7970.

Pełny tekst źródła
Streszczenie:
This article presents access control system constructed with single-board Arduino Uno and RFID technology for user identification. Additional web based system is used for user registration, access restriction, and access monitoring by recording data logs into database.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!