Добірка наукової літератури з теми "Time based access control"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Time based access control".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Time based access control":
Han, Chun Yan, Lian Zhong Liu, and Yi Fei Yuan. "Time Constraints of Access Control." Applied Mechanics and Materials 602-605 (August 2014): 3791–95. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3791.
Liu, Chaoqun, Zhen Peng, and Lili Wu. "Role of Time-Domain Based Access Control Model." Journal of Software Engineering and Applications 09, no. 02 (2016): 57–62. http://dx.doi.org/10.4236/jsea.2016.92004.
Suchendra, Devie Ryana, Dewi Putri Suryani, and Muhammad Ikhsan Sani. "Home Lighting Control Based on Time Scheduling using Crontab." IJAIT (International Journal of Applied Information Technology) 2, no. 01 (May 25, 2018): 1. http://dx.doi.org/10.25124/ijait.v2i01.924.
Ma, Haifeng, and Yangmin Li. "Multi-Power Reaching Law Based Discrete-Time Sliding-Mode Control." IEEE Access 7 (2019): 49822–29. http://dx.doi.org/10.1109/access.2019.2904103.
Zhang, Lili, Qi Zhao, Li Wang, and Lingyu Zhang. "Urban Intersection Signal Control Based on Time-Space Resource Scheduling." IEEE Access 9 (2021): 49281–91. http://dx.doi.org/10.1109/access.2021.3059496.
Danilescu, Marcel, and Victor Besliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII, no. 2 (June 2021): 67–78. http://dx.doi.org/10.52326/jes.utm.2021.28(2).05.
Luo, Yiping, and Junling Zhu. "Finite-Time Average Consensus Control of Multi-Agent Systems Based on the Aperiodically Intermittent Control." IEEE Access 10 (2022): 14959–68. http://dx.doi.org/10.1109/access.2022.3149278.
Duan, Gui-Jiang, and Xin Yan. "A Real-Time Quality Control System Based on Manufacturing Process Data." IEEE Access 8 (2020): 208506–17. http://dx.doi.org/10.1109/access.2020.3038394.
Guo, Jie, Zhanshan Zhao, Fengdong Shi, Ruikun Wang, and Shasha Li. "Observer-Based Synchronization Control for Coronary Artery Time-Delay Chaotic System." IEEE Access 7 (2019): 51222–35. http://dx.doi.org/10.1109/access.2019.2909749.
Aznar-Poveda, Juan, Esteban Egea-Lopez, Antonio-Javier Garcia-Sanchez, and Pablo Pavon-Marino. "Time-to-Collision-Based Awareness and Congestion Control for Vehicular Communications." IEEE Access 7 (2019): 154192–208. http://dx.doi.org/10.1109/access.2019.2949131.
Дисертації з теми "Time based access control":
Jaggi, Felix P. "An access control model based on time and events." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28945.
Science, Faculty of
Computer Science, Department of
Graduate
Alsarhani, Sami. "Reasoning about history based access control policy using past time operators of interval temporal logic." Thesis, De Montfort University, 2014. http://hdl.handle.net/2086/10406.
Knight, G. S. "Scenario-based access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.
Aktoudianakis, Evangelos. "Relationship based access control." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/809642/.
Magnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.
Role based access control (RBAC) is widely used in health care systems today. Some of the biggest systems in use at Norwegian hospitals utilizes role based integration. The basic concept of RBAC is that users are assigned to roles, permissions are assigned to roles and users acquire permissions by being members of roles. An alternative approach to the role based access distribution, is that information should be available only to those who are taking active part in a patients treatment. This approach is called decision based access control (DBAC). While some RBAC implementations grant access to a groups of people by ward, DBAC ensures that access to relevant parts of the patients medical record is given for treatment purposes regardless of which department the health care worker belongs to. Until now the granularity which the legal framework describes has been difficult to follow. The practical approach has been to grant access to entire wards or organizational units in which the patient currently resides. Due to the protection of personal privacy, it is not acceptable that any medical record is available to every clinician at all times. The most important reason to implement DBAC where RBAC exists today, is to get an access control model that is more dynamic. The users should have the access they need to perform their job at all times, but not more access than needed. With RBAC, practice has shown that it is very hard to make dynamic access rules when properties such as time and tasks of an employees work change. This study reveals that pretty much all security measures in the RBAC systems can be overridden by the use of emergency access features. These features are used extensively in everyday work at the hospitals, and thereby creates a security risk. At the same time conformance with the legal framework is not maintained. Two scenarios are simulated in a fictional RBAC and DBAC environment in this report. The results of the simulation show that a complete audit of the logs containing access right enhancements in the RBAC environment is unfeasible at a large hospital, and even checking a few percent of the entries is also a very large job. Changing from RBAC to DBAC would probably affect this situation to the better. Some economical advantages are also pointed out. If a change is made, a considerable amount of time that is used by health care workers to unblock access to information they need in their everyday work will be saved.
Klöck, Clemens. "Auction-based Medium Access Control." [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000007323.
Macfie, Alex. "Semantic role-based access control." Thesis, University of Westminster, 2014. https://westminsterresearch.westminster.ac.uk/item/964y2/semantic-role-based-access-control.
Belokosztolszki, András. "Role-based access control policy administration." Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.615798.
Pang, Kenneth K. (Kenneth Kwok Kit) 1976. "Fine-grained event-based access control." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47532.
Includes bibliographical references (leaf 46).
by Kenneth K. Pang.
B.S.
M.Eng.
Montrieux, Lionel. "Model-based analysis of role-based access control." Thesis, Open University, 2013. http://oro.open.ac.uk/38672/.
Книги з теми "Time based access control":
Zhang, Rui. Relation based access control. Heidelberg: AKA, 2010.
Ferraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.
Ferraiolo, David. Role-based access controls. Boston: Artech House, 2003.
Yuen, Clement. Rate control with pricing in contention-based access networks. Ottawa: National Library of Canada, 2002.
Kogan, Konstantin, and Eugene Khmelnitsky. Scheduling: Control-Based Theory and Polynomial-Time Algorithms. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4675-7.
Kogan, Konstantin. Scheduling: Control-based theory and polynomial-time algorithms. Dordrecht: Kluwer Academic Publishers, 2000.
Hendrick, Thomas E. Purchasing's contributions to time-based strategies. Tempe, Ariz: Center for Advanced Purchasing Studies, 1994.
Larson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Larson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Larson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Частини книг з теми "Time based access control":
Limkar, Suresh, Nivedita Kadam, and Rakesh Kumar Jha. "Access Control Based on Location and Time." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 102–7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32573-1_16.
Chiang, Chia-Chu, and Coskun Bayrak. "Concurrency and Time in Role-Based Access Control." In Advances in Information Security and Its Application, 37–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02633-1_5.
Zou, Lei, Zidong Wang, and Jinling Liang. "Recursive Filtering for Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems, 107–25. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_6.
Zou, Lei, Zidong Wang, and Jinling Liang. "Observer-Based $${\mathscr {H}}_{\infty }$$ Control of Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems, 149–67. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_8.
Zou, Lei, Zidong Wang, and Jinling Liang. "Finite-Horizon $${\mathscr {H}}_{\infty }$$ Fault Estimation of Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems, 71–85. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_4.
Yuan, Zhiyong, Changcheng Zhou, Yiqing Lian, Qingshan Xu, and Siyu Tao. "Multi-point Access Decentralized Wind Power Time Series Model Based on MCMC Algorithm and Hierarchical Clustering Algorithm." In Proceedings of PURPLE MOUNTAIN FORUM 2019-International Forum on Smart Grid Protection and Control, 389–400. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9783-7_31.
Zhang, Jiawei, Yanbo Yang, Ning Lu, Zhiwei Liu, and Jianfeng Ma. "A Privacy-Aware and Time-Limited Data Access Control Scheme with Large Universe and Public Traceability for Cloud-Based IoD." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 103–16. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96791-8_8.
Jyothi, E. V. N., V. Purna Chandra Rao, and B. Rajani. "Study on Recent Method of Dynamic Time-Based Encryption (DTBE) and Searchable Access Control Scheme for Personal Health Record in Cloud Computing." In Cybernetics, Cognition and Machine Learning Applications, 289–93. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_28.
Zhao, Yujuan, Baojiang Cui, and Jie Xu. "A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain." In Communications in Computer and Information Science, 27–36. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9229-1_2.
Jyothi, E. V. N., V. Purna Chandra Rao, and B. Rajani. "Correction to: Study on Recent Method of Dynamic Time-Based Encryption (DTBE) and Searchable Access Control Scheme for Personal Health Record in Cloud Computing." In Cybernetics, Cognition and Machine Learning Applications, C1. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_33.
Тези доповідей конференцій з теми "Time based access control":
Leahu, Marius, Marc Dobson, and Giuseppe Avolio. "Role Based Access Control in the ATLAS Experiment." In 2007 15th IEEE-NPSS Real-Time Conference. IEEE, 2007. http://dx.doi.org/10.1109/rtc.2007.4382738.
Bertolissi, Clara, and Maribel Fernandez. "Time and Location Based Services with Access Control." In 2008 New Technologies, Mobility and Security (NTMS). IEEE, 2008. http://dx.doi.org/10.1109/ntms.2008.ecp.98.
Guang-liang Liu, Xin-you Li, Sheng-xian Xie, Hong-bin Luo, Jun-qing Li, and Yu-ting Wang. "Multi-granularity time-constraint Role-based access control." In 2008 IEEE International Symposium on IT in Medicine and Education (ITME). IEEE, 2008. http://dx.doi.org/10.1109/itme.2008.4744025.
"Real Time Access Control Based on Face Recognition." In International Academy of Engineers. International Academy of Engineers, 2015. http://dx.doi.org/10.15242/iae.iae0615004.
Hung, Le Xuan, Sungyoung Lee, Young-Koo Lee, and Heejo Lee. "Activity-based Access Control Model to Hospital Information." In 2007 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE, 2007. http://dx.doi.org/10.1109/rtcsa.2007.18.
Ramanathan, Narayanan, Allison Beach, Robert Hastings, Weihong Yin, Sima Taheri, Paul Brewer, Dana Eubanks, et al. "Virtual Inductive Loop: Real time video analytics for vehicular access control." In 2021 17th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, 2021. http://dx.doi.org/10.1109/avss52988.2021.9663748.
Liu, Zhenghong, Yuhong Jia, and Tieli Sun. "Study on Role-Based Access Control with Time Constraint." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.232.
Kim, Hyoseung, Pratyush Patel, Shige Wang, and Ragunathan Raj Rajkumar. "A server-based approach for predictable GPU access control." In 2017 IEEE 23rd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). IEEE, 2017. http://dx.doi.org/10.1109/rtcsa.2017.8046309.
Sodiya, Adesina, and Adebukola Onashoga. "Components- Based Access Control Architecture." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3374.
Blower, Andrew, and Gerald Kotonya. "RECON: A Real-time Entity Based Access Control for IoT." In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). IEEE, 2019. http://dx.doi.org/10.1109/iotsms48152.2019.8939218.
Звіти організацій з теми "Time based access control":
Bobashev, Georgiy, John Holloway, Eric Solano, and Boris Gutkin. A Control Theory Model of Smoking. RTI Press, June 2017. http://dx.doi.org/10.3768/rtipress.2017.op.0040.1706.
Jansen, W. A. A revised model for role-based access control. Gaithersburg, MD: National Institute of Standards and Technology, 1998. http://dx.doi.org/10.6028/nist.ir.6192.
Van de Sompel, H., M. Nelson, and R. Sanderson. HTTP Framework for Time-Based Access to Resource States -- Memento. RFC Editor, December 2013. http://dx.doi.org/10.17487/rfc7089.
Chandramouli, Ramaswamy, Zack Butcher, and Aradhna Chetal. Attribute-based Access Control for Microservices-based Applications Using a Service Mesh. National Institute of Standards and Technology, August 2021. http://dx.doi.org/10.6028/nist.sp.800-204b.
Freudenthal, Eric, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti. DRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada440599.
Hu, Vincent C., David Ferraiolo, Rick Kuhn, Adam Schnitzer, Kenneth Sandlin, Robert Miller, and Karen Scarfone. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. National Institute of Standards and Technology, January 2014. http://dx.doi.org/10.6028/nist.sp.800-162.
Yan, Lok K. Hardware Based Function Level Mandatory Access Control for Memory Structures. Fort Belvoir, VA: Defense Technical Information Center, April 2008. http://dx.doi.org/10.21236/ada481104.
Klasky, Hilda B., Sashi Tadinada, Paul T. Williams, and Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), September 2013. http://dx.doi.org/10.2172/1093096.
Hengartner, Urs, and Peter Steenkiste. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Fort Belvoir, VA: Defense Technical Information Center, October 2004. http://dx.doi.org/10.21236/ada457869.
Wijnen, B., R. Presuhn, and K. McCloghrie. View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC Editor, December 2002. http://dx.doi.org/10.17487/rfc3415.