Статті в журналах з теми "Access control decisions"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Access control decisions".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Savchyn, M., A. Zavydniak, and V. Olashyn. "Direct Effect of the Constitution of Ukraine in Focus: Access to the Justice and Judicial Control of the Enforcement of Judgment." Uzhhorod National University Herald. Series: Law, no. 70 (June 18, 2022): 146–55. http://dx.doi.org/10.24144/2307-3322.2022.70.21.
Повний текст джерелаHuang, Kun, and Yun Song Jian. "Research on a New Access Control Technology." Advanced Materials Research 765-767 (September 2013): 1858–62. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1858.
Повний текст джерелаBarrilleaux, Charles J., and Mark E. Miller. "Decisions without Consequences: Cost Control and Access in State Medicaid Programs." Journal of Health Politics, Policy and Law 17, no. 1 (1992): 97–118. http://dx.doi.org/10.1215/03616878-17-1-97.
Повний текст джерелаSheikhalishahi, Mina, Ischa Stork, and Nicola Zannone. "Privacy-preserving policy evaluation in multi-party access control." Journal of Computer Security 29, no. 6 (October 27, 2021): 613–50. http://dx.doi.org/10.3233/jcs-200007.
Повний текст джерелаAtlam, Hany F., Muhammad Ajmal Azad, and Nawfal F. Fadhel. "Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model." Sensors 22, no. 5 (March 4, 2022): 2005. http://dx.doi.org/10.3390/s22052005.
Повний текст джерелаYu, Hui, and Dongyan Chen. "New Optimal Control Decisions for Channel System With Lagged Effect: Dynamic Advertising and Pricing Cases." IEEE Access 7 (2019): 75350–59. http://dx.doi.org/10.1109/access.2019.2918347.
Повний текст джерелаLaitrakun, Seksan. "Decision fusion for composite hypothesis testing in wireless sensor networks over a shared and noisy collision channel." International Journal of Distributed Sensor Networks 16, no. 7 (July 2020): 155014772094020. http://dx.doi.org/10.1177/1550147720940204.
Повний текст джерелаMIAO, Siwei, Xiaojuan ZHANG, and Zhe LIU. "Fine-Grained Access Control Mechanism of Energy Internet." Wuhan University Journal of Natural Sciences 27, no. 3 (June 2022): 231–39. http://dx.doi.org/10.1051/wujns/2022273231.
Повний текст джерелаArudkar, Archna, and Vimla Jethani. "RBAC+: Protecting Web Databases With Access Control Mechanism." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 2, no. 1 (November 27, 2012): 24–30. http://dx.doi.org/10.24297/ijmit.v2i1.1407.
Повний текст джерелаEt. al., Kriti Srivastava,. "NdRAdAC: Need based Access Control Framework for an Emergency Response System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1414–28. http://dx.doi.org/10.17762/turcomat.v12i5.2037.
Повний текст джерелаXu, Yang, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, and Yaoxue Zhang. "A Feasible Fuzzy-Extended Attribute-Based Access Control Technique." Security and Communication Networks 2018 (June 5, 2018): 1–11. http://dx.doi.org/10.1155/2018/6476315.
Повний текст джерелаSadeghi, Mersedeh, Luca Sartor, and Matteo Rossi. "A semantic-based access control approach for systems of systems." ACM SIGAPP Applied Computing Review 21, no. 4 (December 2021): 5–19. http://dx.doi.org/10.1145/3512753.3512754.
Повний текст джерелаDemurjian, Steven A., Eugene Sanzi, Thomas P. Agresta, and William A. Yasnoff. "Multi-Level Security in Healthcare Using a Lattice-Based Access Control Model." International Journal of Privacy and Health Information Management 7, no. 1 (January 2019): 80–102. http://dx.doi.org/10.4018/ijphim.2019010105.
Повний текст джерелаBoluma Mangata, Bopatriciat, Dominique Ilunga N’kashama, Parfum Bukanga Christian, and Donatien Kadima Muamba. "COMPARATIVE STUDIES BETWEEN A FACIAL RECOGNITION SYSTEM AND A FINGERPRINT RECOGNITION SYSTEM FOR ACCESS CONTROL." IJISCS (International Journal of Information System and Computer Science) 6, no. 2 (August 31, 2022): 69. http://dx.doi.org/10.56327/ijiscs.v6i2.1237.
Повний текст джерелаZhao, Bin, Guiyue Zheng, Yilong Gao, and Yanchen Zhao. "Access-Control Model of Super Business System Based on Business Entity." Electronics 11, no. 19 (September 27, 2022): 3073. http://dx.doi.org/10.3390/electronics11193073.
Повний текст джерелаArgall, Brenna D. "Autonomy in Rehabilitation Robotics: An Intersection." Annual Review of Control, Robotics, and Autonomous Systems 1, no. 1 (May 28, 2018): 441–63. http://dx.doi.org/10.1146/annurev-control-061417-041727.
Повний текст джерелаShen, Hai Bo, and Yu Cheng. "A Semantic-Aware Context-Based Access Control Framework for Mobile Web Services." Applied Mechanics and Materials 195-196 (August 2012): 498–503. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.498.
Повний текст джерелаChoi, Donghee, Dohoon Kim, and Seog Park. "A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems." Computational and Mathematical Methods in Medicine 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/265132.
Повний текст джерелаEzeoha, Abel Ebeh, Ebele Ogamba, and Ndi Okereke Onyiuke. "Corporate nationality, foreign control and capital structure decisions in Nigeria." Corporate Ownership and Control 6, no. 1-3 (2008): 371–81. http://dx.doi.org/10.22495/cocv6i1c3p4.
Повний текст джерелаNamane, Sarra, Nassira Ghoualmi, and Mustafa Kaiiali. "Improved Access Control Mechanisms Using Action Weighted Grid Authorization Graph for Faster Decision Making." International Journal of Information Security and Privacy 15, no. 1 (January 2021): 99–116. http://dx.doi.org/10.4018/ijisp.2021010105.
Повний текст джерелаHan, Jiujiang, Yuxiang Zhang, Jian Liu, Ziyuan Li, Ming Xian, Huimei Wang, Feilong Mao, and Yu Chen. "A Blockchain-Based and SGX-Enabled Access Control Framework for IoT." Electronics 11, no. 17 (August 29, 2022): 2710. http://dx.doi.org/10.3390/electronics11172710.
Повний текст джерелаPatil, Mallanagouda, and Rajashekhar C. Biradar. "Media Access Control in Wireless Sensor Networks using Priority Index." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 2 (February 1, 2017): 416. http://dx.doi.org/10.11591/ijeecs.v5.i2.pp416-426.
Повний текст джерелаCastagnoli, Steven P. "Internet-based Decision Tools for Orchard Pest Management—Adoption in the Hood River Valley of Oregon." HortTechnology 16, no. 1 (January 2006): 133–38. http://dx.doi.org/10.21273/horttech.16.1.0133.
Повний текст джерелаCrick, James M., and Dave Crick. "Angel investors’ predictive and control funding criteria." Journal of Research in Marketing and Entrepreneurship 20, no. 1 (July 9, 2018): 34–56. http://dx.doi.org/10.1108/jrme-11-2016-0043.
Повний текст джерелаJames, Sarah, Maree Toombs, and Wendy Brodribb. "Barriers and enablers to postpartum contraception among Aboriginal Australian women: factors influencing contraceptive decisions." Australian Journal of Primary Health 24, no. 3 (2018): 241. http://dx.doi.org/10.1071/py17041.
Повний текст джерелаSousa, Rosilene Paiva Marinho de, Marckson Roberto Ferreira de Sousa, and Guilherme Ataíde Dias. "Entre o acesso aberto e a proteção autoral: os limites autorais nas decisões judiciais." Páginas a&b : Arquivos & Bibliotecas, esp. (2020): 137–41. http://dx.doi.org/10.21747/21836671/pagnesppk15.
Повний текст джерелаMa, Yao, Hong Wei Lu, and Yi Zhu Zhao. "Building a Risk-Aware Adaptive Trust Negotiation Framework." Advanced Materials Research 171-172 (December 2010): 7–10. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.7.
Повний текст джерелаLi, Qing, Peter Magati, Raphael Lencucha, Ronald Labonte, Donald Makoka, and Jeffrey Drope. "The Economic Geography of Kenyan Tobacco Farmers’ Livelihood Decisions." Nicotine & Tobacco Research 21, no. 12 (January 25, 2019): 1711–14. http://dx.doi.org/10.1093/ntr/ntz011.
Повний текст джерелаKnight, Jonathan D., and John D. Mumford. "Decision Support Systems in Crop Protection." Outlook on Agriculture 23, no. 4 (December 1994): 281–85. http://dx.doi.org/10.1177/003072709402300408.
Повний текст джерелаKuczyński, Tadeusz. "SHAPING THE SYSTEM OF JUDICIAL CONTROL OF DISCIPLINARY DECISIONS IN SERVICE RELATIONSHIPS." Roczniki Administracji i Prawa specjalny, no. XXI (December 30, 2021): 599–609. http://dx.doi.org/10.5604/01.3001.0015.6200.
Повний текст джерелаde Carolis, Daniele. "Jurisdiction of the Italian Tax Judge on Administrative Acts Denying Access to the Arbitration Convention on Transfer Pricing: Towards a Dispute Resolution Procedure Ever More Independent of State Con." Intertax 44, Issue 2 (February 1, 2016): 180–84. http://dx.doi.org/10.54648/taxi2016012.
Повний текст джерелаRomaniuk, Oleksandr, Pavlo Skladannyi, and Svitlana Shevchenko. "COMPARATIVE ANALYSIS OF SOLUTIONS TO PROVIDE CONTROL AND MANAGEMENT OF PRIVILEGED ACCESS IN THE IT ENVIRONMENT." Cybersecurity: Education, Science, Technique 16, no. 4 (2022): 98–112. http://dx.doi.org/10.28925/2663-4023.2022.16.98112.
Повний текст джерелаChurubrova, S. M. "Information security policy in the systems of information and analytical maintenance for support of organizational decisions." PROBLEMS IN PROGRAMMING, no. 4 (December 2016): 097–103. http://dx.doi.org/10.15407/pp2016.04.097.
Повний текст джерелаJagadish, H. V., Julia Stoyanovich, and Bill Howe. "COVID-19 Brings Data Equity Challenges to the Fore." Digital Government: Research and Practice 2, no. 2 (March 2021): 1–7. http://dx.doi.org/10.1145/3440889.
Повний текст джерелаMaslennikova, L. N. "TRANSFORMATION OF PRE-TRIAL PROCEEDINGS IN THE INITIAL STAGE OF CRIMINAL PROCEEDINGS, ENSURING ACCESS TO JUSTICE IN THE INDUSTRY 4.0 ERA." Actual Problems of Russian Law, no. 6 (July 18, 2019): 137–46. http://dx.doi.org/10.17803/1994-1471.2019.103.6.137-146.
Повний текст джерелаKaczmarczyk, Martyna. "CONTROLLING ACCESS TO WEAPONS IN A SYSTEMIC ASPECT." PRZEGLĄD POLICYJNY 135, no. 3 (September 2, 2019): 195–206. http://dx.doi.org/10.5604/01.3001.0013.7544.
Повний текст джерелаRoba, Rufo, and Reuben Wambua Kikwatha. "Influence of Women Participation on Sustainability of the Community Conservation Project Implemented by Jaldesa Community Conservancy in Marsabit County, Kenya." European Journal of Business and Management Research 6, no. 3 (June 19, 2021): 188–94. http://dx.doi.org/10.24018/ejbmr.2021.6.3.898.
Повний текст джерелаXie, Pengshou, Haoxuan Yang, Liangxuan Wang, Shuai Wang, Tao Feng, and Yan Yan. "Service-Based Hybrid Access Control Technology with Priority Level for the Internet of Vehicles under the Cloud Architecture." Security and Communication Networks 2021 (December 3, 2021): 1–18. http://dx.doi.org/10.1155/2021/4646087.
Повний текст джерелаBitoun, Ariane, Hans ten Bergen, and Yann Prudent. "Smart Simulation for Decision Support at Headquarters." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 3 (June 1, 2019): 81–90. http://dx.doi.org/10.2478/kbo-2019-0122.
Повний текст джерелаTomaiuolo, Michele. "Trust Enforcing and Trust Building, Different Technologies and Visions." International Journal of Cyber Warfare and Terrorism 2, no. 4 (October 2012): 49–66. http://dx.doi.org/10.4018/ijcwt.2012100104.
Повний текст джерелаKim, Andrew H., Afaf Girgis, Neda Karimi, Alexandra J. Sechi, Joseph Descallar, Jane M. Andrews, Corey A. Siegel, and Susan J. Connor. "A Web-Based Decision Aid (myAID) to Enhance Quality of Life, Empowerment, Decision Making, and Disease Control for Patients With Ulcerative Colitis: Protocol for a Cluster Randomized Controlled Trial." JMIR Research Protocols 9, no. 7 (July 10, 2020): e15994. http://dx.doi.org/10.2196/15994.
Повний текст джерелаArmando, Alessandro, Michele Bezzi, Nadia Metoui, and Antonino Sabetta. "Risk-Based Privacy-Aware Information Disclosure." International Journal of Secure Software Engineering 6, no. 2 (April 2015): 70–89. http://dx.doi.org/10.4018/ijsse.2015040104.
Повний текст джерелаJohansyah, Johansyah. "PUTUSAN MAHKAMAH KONSTITUSI BERSIFAT FINAL DAN MENGIKAT (BINDING)." Solusi 19, no. 2 (May 1, 2021): 165–82. http://dx.doi.org/10.36546/solusi.v19i2.359.
Повний текст джерелаHe, Xiaoshuang, Hechuan Guo, and Xueyu Cheng. "Blockchain-Based Privacy Protection Scheme for IoT-Assisted Educational Big Data Management." Wireless Communications and Mobile Computing 2021 (August 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/3558972.
Повний текст джерелаElAshry, Abdelrahman F., Mohamed M. Ramadan, Ziad A. ElAlaily, Mahmoud M. Zaied, Catherine M. Elias, Omar M. Shehata, and Elsayed I. Morgan. "Development of a hybrid multi-layer control architecture for a cooperative team of N − homogeneous robots." Transactions of the Institute of Measurement and Control 42, no. 3 (September 27, 2019): 404–21. http://dx.doi.org/10.1177/0142331219872862.
Повний текст джерелаBoluma Mangata, Bopatriciat, Dominique Ilunga Nakashama, Donatien Kadima Muamba, and Parfum Bukanga Christian. "Implementation of an access control system based on bimodal biometrics with fusion of global decisions: Application to facial recognition and fingerprints." Journal of Computing Research and Innovation 7, no. 2 (October 4, 2022): 43–53. http://dx.doi.org/10.24191/jcrinn.v7i2.289.
Повний текст джерелаSuleiman, Dima, Malek Al-Zewairi, and Adnan Shaout Shaout. "Enhanced Multilevel Fuzzy Inference System for Risk Adaptive Hybrid RFID Access Control System." International Journal of Online and Biomedical Engineering (iJOE) 18, no. 04 (March 22, 2022): 31–51. http://dx.doi.org/10.3991/ijoe.v18i04.27485.
Повний текст джерелаMelnychenko, Andriy. "Restrictions of individual’s rights, freedoms and legal interests within temporary access to items and documents: practical aspects." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 3, no. 3 (September 30, 2021): 277–84. http://dx.doi.org/10.31733/2078-3566-2021-3-277-284.
Повний текст джерелаHsiao, Chiu-Han, Yean-Fu Wen, Frank Yeong-Sung Lin, Yu-Fang Chen, Yennun Huang, Yang-Che Su, and Ya-Syuan Wu. "An Optimization-Based Orchestrator for Resource Access and Operation Management in Sliced 5G Core Networks." Sensors 22, no. 1 (December 24, 2021): 100. http://dx.doi.org/10.3390/s22010100.
Повний текст джерелаZúquete, André, Hélder Gomes, João Amaral, and Carlos Oliveira. "Security-Oriented Architecture for Managing IoT Deployments." Symmetry 11, no. 10 (October 19, 2019): 1315. http://dx.doi.org/10.3390/sym11101315.
Повний текст джерела