Works matching Access control
Results: 5000
KONTEKSTNO ZAVISNA KONTROLA PRISTUPA.
- Published in:
- InfoM, 2012, n. 41, p. 33
- By:
- Publication type:
- Article
Providing Ontology-Based Access Control for Cloud Data by Exploiting Subsumption Property among Domains of Access Control.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2019, v. 12, n. 3, p. 280, doi. 10.22266/ijies2019.0630.27
- By:
- Publication type:
- Article
Survey of access control in wireless sensor networks.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 2896, doi. 10.3969/j.issn.1001-3695.2013.10.004
- By:
- Publication type:
- Article
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 9, p. 2464, doi. 10.3390/s20092464
- By:
- Publication type:
- Article
Modelling the Impact of Administrative Access Controls on Technical Access Control Measures.
- Published in:
- Information Resources Management Journal, 2017, v. 30, n. 4, p. 53, doi. 10.4018/IRMJ.2017100104
- By:
- Publication type:
- Article
Construction of system friendly attribute based fully distributed access control architecture for e-healthcare.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 17, p. 26937, doi. 10.1007/s11042-023-14836-w
- By:
- Publication type:
- Article
ANFIS for risk estimation in risk-based access control model for smart homes.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 12, p. 18269, doi. 10.1007/s11042-022-14010-8
- By:
- Publication type:
- Article
ACAFD: Secure and Scalable Access Control with Assured File Deletion for Outsourced Data in Cloud.
- Published in:
- Journal of ICT Research & Applications, 2014, v. 8, n. 1, p. 18, doi. 10.5614/itbj.ict.res.appl.2014.8.1.2
- By:
- Publication type:
- Article
Risk-Based Access Control Model: A Systematic Literature Review.
- Published in:
- Future Internet, 2020, v. 12, n. 6, p. 103, doi. 10.3390/fi12060103
- By:
- Publication type:
- Article
Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN.
- Published in:
- Future Internet, 2020, v. 12, n. 1, p. 15, doi. 10.3390/fi12010015
- By:
- Publication type:
- Article
A Collaborative Task Role Based Access Control Model.
- Published in:
- Journal of Information Assurance & Security, 2016, v. 11, n. 6, p. 348
- By:
- Publication type:
- Article
Data Usage and Access Control in Industrial Data Spaces: Implementation Using FIWARE.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 9, p. 3885, doi. 10.3390/su12093885
- By:
- Publication type:
- Article
Detection of Conflicts Between Resource Authorization Rules in Extensible Access Control Markup Language Based on Dynamic Description Logic.
- Published in:
- Ingénierie des Systèmes d'Information, 2020, v. 25, n. 3, p. 285, doi. 10.18280/isi.250301
- By:
- Publication type:
- Article
Security Analysis of the Access Control Solution of NDN Using BAN Logic.
- Published in:
- Mobile Networks & Applications, 2020, v. 25, n. 3, p. 1162, doi. 10.1007/s11036-019-01435-z
- By:
- Publication type:
- Article
Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems.
- Published in:
- Mobile Networks & Applications, 2010, v. 15, n. 2, p. 267, doi. 10.1007/s11036-009-0180-7
- By:
- Publication type:
- Article
IDOT: Black-Box Detection of Access Control Violations in Web Applications.
- Published in:
- ISeCure, 2021, v. 13, n. 2, p. 117, doi. 10.22042/isecure.2021.254089.580
- By:
- Publication type:
- Article
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems.
- Published in:
- ISeCure, 2020, v. 12, n. 2, p. 126
- By:
- Publication type:
- Article
An Automatic Test Case Generator for Evaluating Implementation of Access Control Policies.
- Published in:
- ISeCure, 2017, v. 9, n. 1, p. 73
- By:
- Publication type:
- Article
Medical Record Information Storage Scheme based on Blockchain and Attribute Role-Based Access Control.
- Published in:
- Computer Science & Information Systems, 2024, v. 21, n. 3, p. 807, doi. 10.2298/CSIS231002019B
- By:
- Publication type:
- Article
Research on electronic medical record access control based on blockchain.
- Published in:
- International Journal of Distributed Sensor Networks, 2019, v. 15, n. 11, p. N.PAG, doi. 10.1177/1550147719889330
- By:
- Publication type:
- Article
A comparison of interval division methods in adaptive IEEE 802.11p–based multi-channel medium access control protocols for vehicular ad hoc networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2019, v. 15, n. 2, p. 1, doi. 10.1177/1550147719833566
- By:
- Publication type:
- Article
An Attribute-Based Cross-Domain Access Control Model for a Distributed Multiple Autonomous Network.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2020, v. 30, n. 11/12, p. 1851, doi. 10.1142/S0218194020500400
- By:
- Publication type:
- Article
云环境中层次化的轻量级访问控制方案.
- Published in:
- Journal of Computer Engineering & Applications, 2022, v. 58, n. 21, p. 109, doi. 10.3778/j.issn.1002-8331.2109-0202
- By:
- Publication type:
- Article
在线问诊环境下细粒度双边访问控制方案.
- Published in:
- Journal of Computer Engineering & Applications, 2022, v. 58, n. 17, p. 139, doi. 10.3778/j.issn.1002-8331.2106-0033
- By:
- Publication type:
- Article
Efficient and Revocable Fog-Assisted Cloud Access Control Scheme.
- Published in:
- Journal of Computer Engineering & Applications, 2022, v. 58, n. 13, p. 112, doi. 10.3778/j.issn.1002-8331.2102-0181
- By:
- Publication type:
- Article
An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain.
- Published in:
- Information (2078-2489), 2020, v. 11, n. 2, p. 111, doi. 10.3390/info11020111
- By:
- Publication type:
- Article
MANAGEMENT OF ACCESS CONTROL IN INFORMATION SYSTEM BASED ON ROLE CONCEPT.
- Published in:
- Scalable Computing: Practice & Experience, 2011, v. 12, n. 1, p. 35
- By:
- Publication type:
- Article
Embedding Access Control Policy in Web Service Path Composition Algorithm.
- Published in:
- Journal of Information Science & Engineering, 2011, v. 27, n. 6, p. 1839
- By:
- Publication type:
- Article
A Schema Based Approach to Valid XML Access Control.
- Published in:
- Journal of Information Science & Engineering, 2010, v. 26, n. 5, p. 1719
- By:
- Publication type:
- Article
Identifying high-risk over-entitlement in access control policies using fuzzy logic.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00112-1
- By:
- Publication type:
- Article
Secure Data Sharing with Multiparty Access Control on Cloud.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 352
- By:
- Publication type:
- Article
Residential access control system using QR code and the IoT.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2021, v. 11, n. 4, p. 3267, doi. 10.11591/ijece.v11i4.pp3267-3274
- By:
- Publication type:
- Article
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2018, v. 8, n. 5, p. 3187, doi. 10.11591/ijece.v8i5.pp3187-3193
- By:
- Publication type:
- Article
Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model.
- Published in:
- International Journal of Next-Generation Computing, 2010, v. 1, n. 2, p. 231
- By:
- Publication type:
- Article
Trust and Risk based Access Control and Access Control Constraints.
- Published in:
- KSII Transactions on Internet & Information Systems, 2011, v. 5, n. 11, p. 2254, doi. 10.3837/tiis.2011.11.022
- By:
- Publication type:
- Article
An access control model for the Internet of Things based on zero-knowledge token and blockchain.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2021, v. 2021, n. 1, p. 1, doi. 10.1186/s13638-021-01986-4
- By:
- Publication type:
- Article
BHE-AC: a blockchain-based high-efficiency access control framework for Internet of Things.
- Published in:
- Personal & Ubiquitous Computing, 2022, v. 26, n. 4, p. 971, doi. 10.1007/s00779-020-01498-w
- By:
- Publication type:
- Article
Access Control Models and Frameworks for the IoT Environment: Review, Challenges, and Future Direction.
- Published in:
- Wireless Personal Communications, 2024, v. 138, n. 3, p. 1671, doi. 10.1007/s11277-024-11568-4
- By:
- Publication type:
- Article
Object-Specific Role-Based Access Control.
- Published in:
- International Journal of Cooperative Information Systems, 2019, v. 28, n. 1, p. N.PAG, doi. 10.1142/S0218843019500035
- By:
- Publication type:
- Article
Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud.
- Published in:
- International Journal of Cooperative Information Systems, 2017, v. 26, n. 4, p. -1, doi. 10.1142/S0218843017500034
- By:
- Publication type:
- Article
A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 4, p. 1832, doi. 10.3837/tiis.2018.04.024
- By:
- Publication type:
- Article
EMPLOYING OBJECT-BASED STORAGE DEVICES TO EMBED FILE ACCESS CONTROL IN STORAGE.
- Published in:
- Intelligent Automation & Soft Computing, 2011, v. 17, n. 1, p. 1, doi. 10.1080/10798587.2011.10643129
- By:
- Publication type:
- Article
Hyperledger Fabric Access Control System for Internet of Things Layer in Blockchain-Based Applications.
- Published in:
- Entropy, 2021, v. 23, n. 8, p. 1054, doi. 10.3390/e23081054
- By:
- Publication type:
- Article
IoT Access Control Model Based on Blockchain and Trusted Execution Environment.
- Published in:
- Processes, 2023, v. 11, n. 3, p. 723, doi. 10.3390/pr11030723
- By:
- Publication type:
- Article
Relationship‐based access control: More than a social network access control model.
- Published in:
- WIREs: Data Mining & Knowledge Discovery, 2019, v. 9, n. 2, p. N.PAG, doi. 10.1002/widm.1282
- By:
- Publication type:
- Article
Towards Attribute-Centric Access Control: an ABAC versus RBAC argument.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 16, p. 3152, doi. 10.1002/sec.1520
- By:
- Publication type:
- Article
Identity-based access control for pro-active message's DTN.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 14, p. 2323, doi. 10.1002/sec.1494
- By:
- Publication type:
- Article
Risk adaptive hybrid RFID access control system.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3826, doi. 10.1002/sec.1303
- By:
- Publication type:
- Article
Efficient and Flexible Role-Based Access Control (EF-RBAC) Mechanism for Cloud.
- Published in:
- EAI Endorsed Transactions on Scalable Information Systems, 2020, v. 7, n. 26, p. 1, doi. 10.4108/eai.13-7-2018.161438
- By:
- Publication type:
- Article
Towards the Formal Development of Software Based Systems: Access Control System as a Case Study.
- Published in:
- Information Technology & Control, 2018, v. 47, n. 3, p. 393, doi. 10.5755/j01.itc.47.3.20330
- By:
- Publication type:
- Article