Добірка наукової літератури з теми "Time based access control"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Time based access control".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Time based access control":

1

Han, Chun Yan, Lian Zhong Liu, and Yi Fei Yuan. "Time Constraints of Access Control." Applied Mechanics and Materials 602-605 (August 2014): 3791–95. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3791.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Currently, researches on time constraints for access control are not complete. To solve this problem, this paper enriches the time constraints for access control from the following aspects: firstly, we propose a four-tuple representation of time constraint by combining discrete time representation and periodic time representation; secondly, we put forward a function of computing the time of state changing on the basis of (1); finally, aiming at conflicts detecting and resolution for time constraints, we raise an algorithm for conflicts detection and resolution based on XACML and entities overlapping detection.
2

Liu, Chaoqun, Zhen Peng, and Lili Wu. "Role of Time-Domain Based Access Control Model." Journal of Software Engineering and Applications 09, no. 02 (2016): 57–62. http://dx.doi.org/10.4236/jsea.2016.92004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Suchendra, Devie Ryana, Dewi Putri Suryani, and Muhammad Ikhsan Sani. "Home Lighting Control Based on Time Scheduling using Crontab." IJAIT (International Journal of Applied Information Technology) 2, no. 01 (May 25, 2018): 1. http://dx.doi.org/10.25124/ijait.v2i01.924.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Access control system in smart home concept is a support system that affects especially on controlling the electronic devices. Along with advances in technology, the conventional access control system was developed into an electronic-based access control system. A conventional access control system such as manual electric switches is now beginning to be developed with an electric switch that can be controlled wirelessly from the web. Raspberry pi 2 model B is one of the minicomputers which can be used in an automatic access control system. By using GPIO (General Purpose Input Output) on Raspberry Pi, can be created by a wireless access control system, safe and effective. The purpose of this study is designing a prototype relay control system wirelessly model that can be accessed through the web, the result indicates the possibility of relay control to be remote. Crontab scheduling functions on the controller's relay are used, then the device can function based on a predetermined schedule, it is very helpful to turn on and off electrical devices home remotely. The form of a username and password authentication will be used to protect the system from being accessed by anyone. In the final phase of research, the system is evaluated at day and night using Crontab function. Meanwhile, the response time of the relay is within 1-2 seconds range.
4

Ma, Haifeng, and Yangmin Li. "Multi-Power Reaching Law Based Discrete-Time Sliding-Mode Control." IEEE Access 7 (2019): 49822–29. http://dx.doi.org/10.1109/access.2019.2904103.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Zhang, Lili, Qi Zhao, Li Wang, and Lingyu Zhang. "Urban Intersection Signal Control Based on Time-Space Resource Scheduling." IEEE Access 9 (2021): 49281–91. http://dx.doi.org/10.1109/access.2021.3059496.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Danilescu, Marcel, and Victor Besliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII, no. 2 (June 2021): 67–78. http://dx.doi.org/10.52326/jes.utm.2021.28(2).05.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In recent decades, the number of researches on access control and user actions in computer systems has increased. Over time, there have been two models of implementing Mandatory Access Control (MAC) policies for government institutions and Discretionary Access Control (DAC) for the business environment, policies that various access control modeling solutions seek to implement. Among the access control modeling solutions developed are Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), presented in the U.S.A. by the National Institute of Standard and Technology (NIST). In Romania, in 2010, the access control solution based on trust was presented. This paper presents Mandatory Access Control policy modeling using the trust-based access and actions control modeling solution.
7

Luo, Yiping, and Junling Zhu. "Finite-Time Average Consensus Control of Multi-Agent Systems Based on the Aperiodically Intermittent Control." IEEE Access 10 (2022): 14959–68. http://dx.doi.org/10.1109/access.2022.3149278.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Duan, Gui-Jiang, and Xin Yan. "A Real-Time Quality Control System Based on Manufacturing Process Data." IEEE Access 8 (2020): 208506–17. http://dx.doi.org/10.1109/access.2020.3038394.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Guo, Jie, Zhanshan Zhao, Fengdong Shi, Ruikun Wang, and Shasha Li. "Observer-Based Synchronization Control for Coronary Artery Time-Delay Chaotic System." IEEE Access 7 (2019): 51222–35. http://dx.doi.org/10.1109/access.2019.2909749.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Aznar-Poveda, Juan, Esteban Egea-Lopez, Antonio-Javier Garcia-Sanchez, and Pablo Pavon-Marino. "Time-to-Collision-Based Awareness and Congestion Control for Vehicular Communications." IEEE Access 7 (2019): 154192–208. http://dx.doi.org/10.1109/access.2019.2949131.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Time based access control":

1

Jaggi, Felix P. "An access control model based on time and events." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28945.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A new access control model incorporating the notion of time and events is introduced. It allows the specification of fine-grained and flexible security policies which are sensitive to the operating environment. The system constraints, expressed in terms of access windows and obligations, are stored in extended access control lists. The addition of a capability mechanism gives another dimension of protection and added flexibility, so that the flexibility and expressive power of the system constraints is fully supported by the underlying mechanism. The approach is compared to several existing models and its' expressive power is demonstrated by showing the new model can be used to specify different existing security models as well as some special problems. The model is then adapted to work in a distributed environment.
Science, Faculty of
Computer Science, Department of
Graduate
2

Alsarhani, Sami. "Reasoning about history based access control policy using past time operators of interval temporal logic." Thesis, De Montfort University, 2014. http://hdl.handle.net/2086/10406.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Interval Temporal Logic (ITL) is a flexible notation for the propositional and first-order logical reasoning about periods of time that exist in specifications of hardware and software systems. ITL is different from other temporal logics since it can deal with both sequential and parallel composition and provides powerful and extensible specification and verification methods for reasoning about properties such as safety, time projection and liveness. Most imperative programming constructs can be seen as ITL formula that form the basis of an executable framework called Tempura that is used for the development and testing of ITL specifications.\\ ITL has only future operators, but the use of past operators make specifications referring to history more succinct; that is, there are classes of properties that can be expressed by means of much shorter formulas. What is more, statements are easier to express (simplicity) when past operators are included. Moreover, using past operators does not increase the complexity of interval temporal logic regarding the formula size and the simplicity. This thesis introduces past time of interval temporal logic where, instead of future time operators Chop, Chopstar, and Skip, we have past operators past Chop, past Chopstar and past Skip. The syntax and semantics of past time ITL are given together with its axiom and proof system. Furthermore, Security Analysis Toolkit for Agents (SANTA) operators such always-followed-by and the strong version of it has been given history based semantics using past time operators. In order to evaluate past time interval temporal logic, the problem of specification, verification of history based access control policies has been selected. This problem has already been solved using future time of interval temporal logic ITL but the drawback is that policy rules are not succinct and simple. However, the use of past time operators of ITL produces simple and succinct policy rules. The verification technique used to proof the safety property of history based access control policies is adapted for past time ITL to show that past time operators of interval temporal logic can specify and verify a security scenario such as history based access control policy.
3

Knight, G. S. "Scenario-based access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Aktoudianakis, Evangelos. "Relationship based access control." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/809642/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Relationship Based Access Control (ReBAC) has emerged as a popular alternative to traditional access control models, such as Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC). However, some of the model's aspects, such as its expression language and delegation abilities have not been studied in depth. Further-more, existing ReBAC models cater to single policy control, thus not taking into account cases were many access control policies might apply to a single access control object. We propose a ReBAC model, set theoretic ReBac (STReBAC), which bases its expression language on set theory. Our model is expressive and exible, catering to the above problems, and able to overcome access control challenges as discussed by popular ReBAC models without needing to alter its formal grammar. Additionally, we extend our model to handle situations where more than one policy applies to the same access control object. To achieve this we have combined our STReBAC model with PTaCL which is an evaluation framework for ABAC. We provide a solution which is compatible with many industrial standards, such as eXtensible Access Control Markup Language (XACML) and Ponder, and formalise techniques used by those very standards to extend our model without sacri�cing its original exibility. As part of our research, we implement a demonstrator that proves how our formal model can be applied to real life industrial problems, whether as a stand alone project or as part of a larger access control mechanism. To demonstrate the above, we implement our model in terms of Application Programming Interface (API)s that are widely used by today's industry. This shows that our STReBAC models can be translated into implementations which are exible and scalable.
5

Magnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:

Role based access control (RBAC) is widely used in health care systems today. Some of the biggest systems in use at Norwegian hospitals utilizes role based integration. The basic concept of RBAC is that users are assigned to roles, permissions are assigned to roles and users acquire permissions by being members of roles. An alternative approach to the role based access distribution, is that information should be available only to those who are taking active part in a patient’s treatment. This approach is called decision based access control (DBAC). While some RBAC implementations grant access to a groups of people by ward, DBAC ensures that access to relevant parts of the patient’s medical record is given for treatment purposes regardless of which department the health care worker belongs to. Until now the granularity which the legal framework describes has been difficult to follow. The practical approach has been to grant access to entire wards or organizational units in which the patient currently resides. Due to the protection of personal privacy, it is not acceptable that any medical record is available to every clinician at all times. The most important reason to implement DBAC where RBAC exists today, is to get an access control model that is more dynamic. The users should have the access they need to perform their job at all times, but not more access than needed. With RBAC, practice has shown that it is very hard to make dynamic access rules when properties such as time and tasks of an employee’s work change. This study reveals that pretty much all security measures in the RBAC systems can be overridden by the use of emergency access features. These features are used extensively in everyday work at the hospitals, and thereby creates a security risk. At the same time conformance with the legal framework is not maintained. Two scenarios are simulated in a fictional RBAC and DBAC environment in this report. The results of the simulation show that a complete audit of the logs containing access right enhancements in the RBAC environment is unfeasible at a large hospital, and even checking a few percent of the entries is also a very large job. Changing from RBAC to DBAC would probably affect this situation to the better. Some economical advantages are also pointed out. If a change is made, a considerable amount of time that is used by health care workers to unblock access to information they need in their everyday work will be saved.

6

Klöck, Clemens. "Auction-based Medium Access Control." [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000007323.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Macfie, Alex. "Semantic role-based access control." Thesis, University of Westminster, 2014. https://westminsterresearch.westminster.ac.uk/item/964y2/semantic-role-based-access-control.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this thesis we propose two semantic ontological role-based access control (RBAC) reasoning processes. These processes infer user authorisations according to a set of role permission and denial assignments, together with user role assignments. The first process, SO-RBAC (Semantic Ontological Role-Based Access Control) uses OWL-DL to store the ontology, and SWRL to perform reasoning. It is based mainly on RBAC models previously described using Prolog. This demonstrates the feasibility of writing an RBAC model in OWL and performing reasoning inside it, but is still tied closely to descriptive logic concepts, and does not effectively exploit OWL features such as the class hierarchy. To fully exploit the capabilities of OWL, it was necessary to enhance the SO-RBAC model by programming it in OWL-Full. The resulting OWL-Full model, ESO-RBAC (Enhanced Semantic Ontological Role-Based Access Control), uses Jena for performing reasoning, and allows an object-oriented definition of roles and of data items. The definitions of roles as classes, and users as members of classes representing roles, allows user-role assignments to be defined in a way that is natural to OWL. All information relevant to determining authorisations is stored in the ontology. The resulting RBAC model is more flexible than models based on predicate logic and relational database systems. There are three motivations for this research. First, we found that relational database systems do not implement all of the features of RBAC that we modelled in Prolog. Furthermore, implementations of RBAC in database management systems is always vendor-specific, so the user is dependent on a particular vendor's procedures when granting permissions and denials. Second, Prolog and relational database systems cannot naturally represent hierarchical data, which is the backbone of any semantic representation of RBAC models. An RBAC model should be able to infer user authorisations from a hierarchy of both roles and data types, that is, determine permission or denial from not just the type of role (which may include sub-roles), but also the type of data (which may include sub-types). Third, OWL reasoner-enabled ontologies allow us to describe and manipulate the semantics of RBAC differently, and consequently to address the previous two problems efficiently. The contribution of this thesis is twofold. First, we propose semantic ontological reasoning processes, which are domain and implementation independent, and can be run from any distributed computing environment. This can be developed through integrated development environments such as NetBeans and using OWL APIs. Second, we have pioneered a way of exploiting OWL and its reasoners for the purpose of defining and manipulating the semantics of RBAC. Therefore, we automatically infer OWL concepts according to a specific stage that we define in our proposed reasoning processes. OWL ontologies are not static vocabularies of terms and constraints that define the semantics of RBAC. They are repositories of concepts that allow ad-hoc inference, with the ultimate goal in RBAC of granting permissions and denials.
8

Belokosztolszki, András. "Role-based access control policy administration." Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.615798.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Pang, Kenneth K. (Kenneth Kwok Kit) 1976. "Fine-grained event-based access control." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47532.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; and, Thesis (B.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (leaf 46).
by Kenneth K. Pang.
B.S.
M.Eng.
10

Montrieux, Lionel. "Model-based analysis of role-based access control." Thesis, Open University, 2013. http://oro.open.ac.uk/38672/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Model-Driven Engineering (MDE) has been extensively studied. Many directions have been explored, sometimes with the dream of providing a fully integrated approach for designers, developers and other stakeholders to create, reason about and modify models representing software systems. Most, but not all, of the research in MDE has focused on general-purpose languages and models, such as Java and UML. Domain-specific and cross-cutting concerns, such as security, are increasingly essential parts of a software system, but are only treated as second-class citizens in the most popular modelling languages. Efforts have been made to give security, and in particular access control, a more prominent place in MDE, but most of these approaches require advanced knowledge in security, programming (often declarative), or both, making them difficult to use by less technically trained stakeholders. In this thesis, we propose an approach to modelling, analysing and automatically fixing role-based access control (RBAC) that does not require users to write code or queries themselves. To this end, we use two UML profiles and associated OCL constraints that provide the modelling and analysis features. We propose a taxonomy of OCL constraints and use it to define a partial order between categories of constraints, that we use to propose strategies to speed up the models’ evaluation time. Finally, by representing OCL constraints as constraints on a graph, we propose an automated approach for generating lists of model changes that can be applied to an incorrect model in order to fix it. All these features have been fully integrated into a UML modelling IDE, IBM Rational Software Architect.

Книги з теми "Time based access control":

1

Zhang, Rui. Relation based access control. Heidelberg: AKA, 2010.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Ferraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ferraiolo, David. Role-based access controls. Boston: Artech House, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Yuen, Clement. Rate control with pricing in contention-based access networks. Ottawa: National Library of Canada, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kogan, Konstantin, and Eugene Khmelnitsky. Scheduling: Control-Based Theory and Polynomial-Time Algorithms. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4675-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Kogan, Konstantin. Scheduling: Control-based theory and polynomial-time algorithms. Dordrecht: Kluwer Academic Publishers, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Hendrick, Thomas E. Purchasing's contributions to time-based strategies. Tempe, Ariz: Center for Advanced Purchasing Studies, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Larson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Larson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Larson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Time based access control":

1

Limkar, Suresh, Nivedita Kadam, and Rakesh Kumar Jha. "Access Control Based on Location and Time." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 102–7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32573-1_16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Chiang, Chia-Chu, and Coskun Bayrak. "Concurrency and Time in Role-Based Access Control." In Advances in Information Security and Its Application, 37–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02633-1_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Zou, Lei, Zidong Wang, and Jinling Liang. "Recursive Filtering for Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems, 107–25. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Zou, Lei, Zidong Wang, and Jinling Liang. "Observer-Based $${\mathscr {H}}_{\infty }$$ Control of Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems, 149–67. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Zou, Lei, Zidong Wang, and Jinling Liang. "Finite-Horizon $${\mathscr {H}}_{\infty }$$ Fault Estimation of Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems, 71–85. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Yuan, Zhiyong, Changcheng Zhou, Yiqing Lian, Qingshan Xu, and Siyu Tao. "Multi-point Access Decentralized Wind Power Time Series Model Based on MCMC Algorithm and Hierarchical Clustering Algorithm." In Proceedings of PURPLE MOUNTAIN FORUM 2019-International Forum on Smart Grid Protection and Control, 389–400. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9783-7_31.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Zhang, Jiawei, Yanbo Yang, Ning Lu, Zhiwei Liu, and Jianfeng Ma. "A Privacy-Aware and Time-Limited Data Access Control Scheme with Large Universe and Public Traceability for Cloud-Based IoD." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 103–16. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96791-8_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Jyothi, E. V. N., V. Purna Chandra Rao, and B. Rajani. "Study on Recent Method of Dynamic Time-Based Encryption (DTBE) and Searchable Access Control Scheme for Personal Health Record in Cloud Computing." In Cybernetics, Cognition and Machine Learning Applications, 289–93. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Zhao, Yujuan, Baojiang Cui, and Jie Xu. "A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain." In Communications in Computer and Information Science, 27–36. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9229-1_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractWith the continuous development of distributed technology, blockchain has been widely applied to solve practical problems in various fields. Its advantages such as decentralization and non-tamperability perfectly meet the needs of permanent query of traceability scene information, and can solve the trust problem of multi-party participation in various links. At the same time, as data security has received more and more attention. The privacy protection and permission control of “on-chain” data need to be resolved. Medical data records are very valuable and sensitive data. Reliable storage and credible traceability are of great significance to the health of patients and the long-term development of medical undertakings. To issue the above problems, here, we propose a secure medical data traceability system that combines data desensitization and attribute-based encryption algorithms to achieve the traceability capabilities and ensure the reliable storage of medical data records on blockchain. Data desensitization provides a certain degree of security for sensitive data involving personal information in medical data. The introduction of attribute encryption has solved the problem of unauthorized access to data. Finally, we analyzed the security of the solution and Verify the efficiency of the program.
10

Jyothi, E. V. N., V. Purna Chandra Rao, and B. Rajani. "Correction to: Study on Recent Method of Dynamic Time-Based Encryption (DTBE) and Searchable Access Control Scheme for Personal Health Record in Cloud Computing." In Cybernetics, Cognition and Machine Learning Applications, C1. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_33.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Time based access control":

1

Leahu, Marius, Marc Dobson, and Giuseppe Avolio. "Role Based Access Control in the ATLAS Experiment." In 2007 15th IEEE-NPSS Real-Time Conference. IEEE, 2007. http://dx.doi.org/10.1109/rtc.2007.4382738.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Bertolissi, Clara, and Maribel Fernandez. "Time and Location Based Services with Access Control." In 2008 New Technologies, Mobility and Security (NTMS). IEEE, 2008. http://dx.doi.org/10.1109/ntms.2008.ecp.98.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Guang-liang Liu, Xin-you Li, Sheng-xian Xie, Hong-bin Luo, Jun-qing Li, and Yu-ting Wang. "Multi-granularity time-constraint Role-based access control." In 2008 IEEE International Symposium on IT in Medicine and Education (ITME). IEEE, 2008. http://dx.doi.org/10.1109/itme.2008.4744025.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

"Real Time Access Control Based on Face Recognition." In International Academy of Engineers. International Academy of Engineers, 2015. http://dx.doi.org/10.15242/iae.iae0615004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Hung, Le Xuan, Sungyoung Lee, Young-Koo Lee, and Heejo Lee. "Activity-based Access Control Model to Hospital Information." In 2007 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE, 2007. http://dx.doi.org/10.1109/rtcsa.2007.18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Ramanathan, Narayanan, Allison Beach, Robert Hastings, Weihong Yin, Sima Taheri, Paul Brewer, Dana Eubanks, et al. "Virtual Inductive Loop: Real time video analytics for vehicular access control." In 2021 17th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, 2021. http://dx.doi.org/10.1109/avss52988.2021.9663748.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Liu, Zhenghong, Yuhong Jia, and Tieli Sun. "Study on Role-Based Access Control with Time Constraint." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.232.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Kim, Hyoseung, Pratyush Patel, Shige Wang, and Ragunathan Raj Rajkumar. "A server-based approach for predictable GPU access control." In 2017 IEEE 23rd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). IEEE, 2017. http://dx.doi.org/10.1109/rtcsa.2017.8046309.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Sodiya, Adesina, and Adebukola Onashoga. "Components- Based Access Control Architecture." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3374.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Ensuring adequate security of information has been a growing concern of individuals and organizations. There is then the need to provide suitable access control mechanism for preventing insider abuses and ensuring appropriate use of resources. This paper presents an access control scheme that adopts the techniques of Role-Based Access Control (RBAC), Purpose-Based Access Control (PBAC), Time-Based Access Control (TBAC) and History-Based Access Control (HBAC) as components to form an integrated Components-based Access Control Architecture (CACA). In CACA, an Access Control Score (ACS) is computed from the combined access control techniques. CACA also combines ACS with the sensitivity nature of system resources before a level of access is granted. The architecture was implemented within a payroll system developed using JAVA and SQL. Using usability testing, the evaluation of CACA showed 92% reduction in insider abuses and misuse of privileges. This shows that CACA can provide higher level of security access as against what used to exist.
10

Blower, Andrew, and Gerald Kotonya. "RECON: A Real-time Entity Based Access Control for IoT." In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). IEEE, 2019. http://dx.doi.org/10.1109/iotsms48152.2019.8939218.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Time based access control":

1

Bobashev, Georgiy, John Holloway, Eric Solano, and Boris Gutkin. A Control Theory Model of Smoking. RTI Press, June 2017. http://dx.doi.org/10.3768/rtipress.2017.op.0040.1706.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
We present a heuristic control theory model that describes smoking under restricted and unrestricted access to cigarettes. The model is based on the allostasis theory and uses a formal representation of a multiscale opponent process. The model simulates smoking behavior of an individual and produces both short-term (“loading up” after not smoking for a while) and long-term smoking patterns (e.g., gradual transition from a few cigarettes to one pack a day). By introducing a formal representation of withdrawal- and craving-like processes, the model produces gradual increases over time in withdrawal- and craving-like signals associated with abstinence and shows that after 3 months of abstinence, craving disappears. The model was programmed as a computer application allowing users to select simulation scenarios. The application links images of brain regions that are activated during the binge/intoxication, withdrawal, or craving with corresponding simulated states. The model was calibrated to represent smoking patterns described in peer-reviewed literature; however, it is generic enough to be adapted to other drugs, including cocaine and opioids. Although the model does not mechanistically describe specific neurobiological processes, it can be useful in prevention and treatment practices as an illustration of drug-using behaviors and expected dynamics of withdrawal and craving during abstinence.
2

Jansen, W. A. A revised model for role-based access control. Gaithersburg, MD: National Institute of Standards and Technology, 1998. http://dx.doi.org/10.6028/nist.ir.6192.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Van de Sompel, H., M. Nelson, and R. Sanderson. HTTP Framework for Time-Based Access to Resource States -- Memento. RFC Editor, December 2013. http://dx.doi.org/10.17487/rfc7089.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Chandramouli, Ramaswamy, Zack Butcher, and Aradhna Chetal. Attribute-based Access Control for Microservices-based Applications Using a Service Mesh. National Institute of Standards and Technology, August 2021. http://dx.doi.org/10.6028/nist.sp.800-204b.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Freudenthal, Eric, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti. DRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada440599.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Hu, Vincent C., David Ferraiolo, Rick Kuhn, Adam Schnitzer, Kenneth Sandlin, Robert Miller, and Karen Scarfone. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. National Institute of Standards and Technology, January 2014. http://dx.doi.org/10.6028/nist.sp.800-162.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Yan, Lok K. Hardware Based Function Level Mandatory Access Control for Memory Structures. Fort Belvoir, VA: Defense Technical Information Center, April 2008. http://dx.doi.org/10.21236/ada481104.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Klasky, Hilda B., Sashi Tadinada, Paul T. Williams, and Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), September 2013. http://dx.doi.org/10.2172/1093096.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Hengartner, Urs, and Peter Steenkiste. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Fort Belvoir, VA: Defense Technical Information Center, October 2004. http://dx.doi.org/10.21236/ada457869.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Wijnen, B., R. Presuhn, and K. McCloghrie. View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC Editor, December 2002. http://dx.doi.org/10.17487/rfc3415.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії