Academic literature on the topic 'Access'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Access.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Access"
Milbourne, Andrea. "Access, access, access." Cancer 110, no. 5 (2007): 941–42. http://dx.doi.org/10.1002/cncr.22869.
Full textChepuru, Anitha, Dr K. Venugopal Rao, and Amardeep Matta. "Server Access Control." International Journal of Scientific Research 1, no. 7 (June 1, 2012): 78–79. http://dx.doi.org/10.15373/22778179/dec2012/31.
Full textElliott, Deni, and Pamela S. Hogle. "Access Rights and Access Wrongs." International Journal of Applied Philosophy 27, no. 1 (2013): 1–14. http://dx.doi.org/10.5840/ijap20132716.
Full textDyke, Stephanie O. M., Mikael Linden, Ilkka Lappalainen, Jordi Rambla De Argila, Knox Carey, David Lloyd, J. Dylan Spalding, et al. "Registered access: authorizing data access." European Journal of Human Genetics 26, no. 12 (August 2, 2018): 1721–31. http://dx.doi.org/10.1038/s41431-018-0219-y.
Full textPackham, K. "Access all areas [Internet access]." Information Professional 1, no. 3 (August 1, 2004): 36–39. http://dx.doi.org/10.1049/inp:20040308.
Full textKarabut, N. O., D. V. Shvets, and S. O. Lukash. "Safe corporate network access." Mining Journal of Kryvyi Rih National University, no. 104 (2018): 47–50. http://dx.doi.org/10.31721/2306-5435-2018-1-104-47-50.
Full textKUNISAWA, Takashi, and Shuichi IWATA. "CODATA and "Open Access"." Joho Chishiki Gakkaishi 15, no. 3 (2005): 42–47. http://dx.doi.org/10.2964/jsik_kj00003803577.
Full textBOELLSTORFF, TOM. "Access." American Anthropologist 111, no. 1 (March 2009): 1–4. http://dx.doi.org/10.1111/j.1548-1433.2009.01067.x.
Full textWaters, Bryan A. "ACCESS." Public Library Quarterly 18, no. 2 (June 2000): 83. http://dx.doi.org/10.1300/j118v18n02_22.
Full textLavagnino, J. "Access." Literary and Linguistic Computing 24, no. 1 (April 1, 2009): 63–76. http://dx.doi.org/10.1093/llc/fqn038.
Full textDissertations / Theses on the topic "Access"
Conocimiento, Dirección de Gestión del. "Guía de acceso para Access Engineering." McGraw-Hill, 2021. http://hdl.handle.net/10757/655256.
Full textConocimiento, Dirección de Gestión del. "Guía de acceso para Access Medicine." McGraw-Hill, 2021. http://hdl.handle.net/10757/655257.
Full textConocimiento, Dirección de Gestión del. "Guía de acceso para Access Physiotherapy." McGraw-Hill, 2021. http://hdl.handle.net/10757/655258.
Full textSILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.
Full textO uso de computação distribuída vem expandindo seu escopo, saindo de aplicações em redes locais para aplicações envolvendo diversas instituições. Em termos de segurança, essa expansão introduz desafios em identificar usuários oriundos das diferentes organizações e definir seus direitos de acesso a determinado recurso. Abordagens comuns adotam a replicação do cadastro dos usuários pelas diversas instituições ou o compartilhamente de uma mesma identidade por um conjunto de usuários. Entretanto, essas estratégias apresentam deficiências, demandando, por exemplo, maior esforço de gerência por parte dos administradores e até esbarrando em políticas de privacidade. Neste trabalho propomos uma arquitetura que utiliza o conceito de papéis para a autenticação e o controle de acesso entre diferentes instituições. Baseado em uma relação de confiança entre as organizações, a arquitetura permite que os usuários sejam autenticados na instituições onde estão afiliados e utiliza o papel por eles desempenhados para controlar o acesso aos recursos disponibilizados pelas demais organizações.
Distributed computing has been expanding its scope from local area network applications to wide-area applications, involving different organizations. This expansion implies in several new security challenges, such as the identification of users originating from different organizations and the definition of their access rights. Commom aproaches involve replicating user data in several institutions or sharing identities among sets of users. However, these approaches have several limitations, sucj as the increased management effort of administrators or problems with privacy policies. This work proposes a framework for inter-institucional authentication. The framework is based on the concepts of RBAC (role-based access control) and of trust between organizations.
Atkins, Derek A. (Derek Allan). "Media Bank--access and access control." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/61086.
Full textByrnes, Collin DeMeere. "Access." This title; PDF viewer required Home page for entire collection, 2007. http://archives.udmercy.edu:8080/dspace/handle/10429/9.
Full textHoppenstand, Gregory S. "Secure access control with high access precision/." Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/23386.
Full textGOMES, CARMEN ANTUNES. "RANDON ACCESS WITH NOTIFICATION: MULTIPLE ACCESS PROTOCOLS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1993. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9396@1.
Full textEste trabalho propõe e analisa uma versão de um protocolo híbrido de acesso aleatório com notificação, desenvolvido para redes VSAT ( Very Small Aperture Terminal) onde se busca uma combinação do baixo tempo de resposta de protocolos do tipo RA-TDMA (Random Access-Time Division Multiple Access) . No protocolo aqui estudado as transmissões são feitas em uma primeira tentativa através de um esquema RA-TDMA e no caso de ocorrência de colisão, os pacotes envolvidos são retransmitidos através de um esquema DA-TDMA. As notificações de transmissões são feitas pelas estações VSAT, através de um canal de sinalização, onde é atribuído a cada uma delas um segmento de tempo, aqui referido como slot de tempo, de posição fixa dentro de cada quadro. O desempenho do protocolo é analisado utilizando a técnica de Análise no Ponto de Equilíbrio (EPA), sendo considerados como medida de desempenho os parâmetros retardo médio de mensagem, vazão e taxa de rejeição de pacotes. São consideradas mensagens de um pacote e mensagens de tamanho variável. Comparações com outros protocolos contendo buffer ou não, também analisados utilizando a técnica EPA, são realizadas. Resultados de simulação encontrados na literatura de dois outros protocolos são também apresentados.
A version of a random access with notification, multiple access protocol developed for VSAT networks is considered. This hybrid protocol combines the low response delay of RA- TDMA contention protocols with the efficiency and stability of DA-TDMA type protocols. In the considered protocol a message generated by a VSAT station is transmitted, in a first attempt, using a RA-TDMA type of scheme. If a collision occurs in this first transmission of the message the collided packets are retransmitted through a Demand Assignment (DA)-TDMA type of access. When a remote station transmits its message in a RA-TDMA contention mode it notifies the central hub using a separate TDMA channel in which a fixed position time slot is reserved to each station within a frame. The performance of the protocol is evaluated in terms of throughput, expected delay and packet rejection rate by means of the so called Equiilibrium Point Analysis (EPA). Single and multi-packet messages, with a random number of packets, are considered in the performance analysis. Comparisons with other hybrid protocols, which were also evaluated in the literature by means of the EPA technique or through simulation results, are presented.
Brown, Trevor Junior. "Time division multiple access/code division multiple access for the optical local access network." Thesis, Manchester Metropolitan University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243716.
Full textKottahachchi, Buddhika. "ACCESS : Access Controls for Cooperatively Enabled Smart Spaces." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/32101.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (leaves 75-79).
Traditionally, access control mechanisms have been static in nature, requiring explicit intervention in order to change their behavior. However, since security requirements can be expected to change frequently and rapidly in ubiquitous computing environments, access control mechanisms that can react to the context in which they are applied are desirable. With this in mind, we have created ACCESS (Access Controls for Cooperatively Enabled Smart Spaces); a framework for enabling dynamic, role-based and context-aware access control mechanisms in ubiquitous computing applications.
by Buddhika Kottahachchi.
M.Eng.
Books on the topic "Access"
Wurman, Richard Saul. Florence access, Venice access, Milan access. San Francisco: Access Press, 1991.
Find full text1938-, Cumming Peter A., Lee Enid, and Oreopoulos D. G, eds. Access! [Toronto, Ont.]: Ontario Ministry of Citizenship, 1989.
Find full text1935-, Wurman Richard Saul, and Access Press, eds. Access. New York, NY: Access Press, 2006.
Find full textCovello, Pietschmann Patti, ed. Access. New York, NY: AccessPress, 2008.
Find full text1935-, Wurman Richard Saul, and Access Press, eds. Access. New York, NY: Access Press, 2004.
Find full textMohamed, Belinda. Access. USA: African Press, 2008.
Find full textSteve, Davis. Access. New York: MIS Press, 1993.
Find full textAccess? Helena, Mont.?] : International Right of Way Association Incorporated, Montana Big Sky Chapter 45 ; [Washington, D.C.?: Bureau of Land Management, 1987.
Find full textAccess Accents Welsh South Access Accents. Methuen Publishing, 2008.
Find full textAccess Accents An Accent Training Resource For Actors. Methuen Publishing, 2008.
Find full textBook chapters on the topic "Access"
Al-Worafi, Yaser. "Access and Equitable Access." In A Guide to Online Pharmacy Education, 73–78. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003230458-13.
Full textOakley, Jacob G. "Access." In Waging Cyber War, 101–14. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4950-5_8.
Full textMcCowan, Tristan. "Access." In Palgrave Studies in Global Higher Education, 149–73. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19597-7_6.
Full textRodgers, James. "Access." In Reporting Conflict, 28–45. London: Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-1-137-00889-3_3.
Full textHersh, William. "Access." In Health Informatics, 261–87. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47686-1_6.
Full textWeik, Martin H. "access." In Computer Science and Communications Dictionary, 9. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_96.
Full textBadcock, Elly, Elise Bromann Bukhave, and Jennifer Creek. "Access." In Theorising Occupational Therapy Practice in Diverse Settings, 100–121. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003016755-6.
Full textGibson, Johanna. "Access." In Intellectual Property, Medicine and Health, 145–71. 2nd edition. | New York, NY : Routledge, 2018. |: Routledge, 2017. http://dx.doi.org/10.4324/9781315589145-9.
Full textRérat, Patrick. "Access." In Cycling to Work, 59–63. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62256-5_6.
Full textStephens, Rod. "Access." In Microsoft Office Programming: A Guide for Experienced Developers, 469–522. Berkeley, CA: Apress, 2003. http://dx.doi.org/10.1007/978-1-4302-0795-5_10.
Full textConference papers on the topic "Access"
Ruobin Zheng, Wenle Yang, and Jun Zhou. "Future access architecture: Software-defined accesss networking." In 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC). IEEE, 2014. http://dx.doi.org/10.1109/ccnc.2014.6940517.
Full textSchwarz, Michael, Raphael Stahl, Daniel Müller-Gritschneder, Ulf Schlichtmann, Dominik Stoffel, and Wolfgang Kunz. "ACCESS." In DAC '19: The 56th Annual Design Automation Conference 2019. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3316781.3317756.
Full textParmanto, Bambang, Reza Ferrydiansyah, Andi Saptono, Lijing Song, I. Wayan Sugiantara, and Stephanie Hackett. "AcceSS." In the 2005 International Cross-Disciplinary Workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1061811.1061815.
Full textYang, Yi, Yunqi Hu, Yidi Hong, Varun Joshi, and Radhika Kolathumani. "Access." In CHI'16: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2851581.2889440.
Full textHeron, Michael, Vicki L. Hanson, and Ian W. Ricketts. "ACCESS." In the 5th ACM SIGCHI symposium. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2494603.2480316.
Full textBautin, Mikhail, Charles B. Ward, Akshay Patil, and Steven S. Skiena. "Access." In the 19th international conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1772690.1772889.
Full textAlmehmadi, Abdulaziz, and Khalil El-Khatib. "Authorized! access denied, unauthorized! access granted." In the 6th International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2523514.2523612.
Full textKoudouridis, G. P., R. Aguero, K. Daoud, J. Gebert, M. Prytz, T. Rinta-aho, J. Sachs, and H. Tang. "Access Flow based Multi-Radio Access Connectivity." In 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394739.
Full textKitova, E. T., N. I. Gorlov, and I. V. Bogachkov. "Unauthorized Access Monitoring in Optical Access Networks." In 2020 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO). IEEE, 2020. http://dx.doi.org/10.1109/synchroinfo49631.2020.9166039.
Full textCui, Tao, and Tracey Ho. "On multiple access random medium access control." In 2009 IEEE International Symposium on Information Theory - ISIT. IEEE, 2009. http://dx.doi.org/10.1109/isit.2009.5205457.
Full textReports on the topic "Access"
Moline, Judi, and Steve Otto. Electronic access :. Gaithersburg, MD: National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.sp.500-227.
Full textResearch Institute (IFPRI), International Food Policy. Market access. Washington, DC: International Food Policy Research Institute, 2014. http://dx.doi.org/10.2499/9780896298460_28.
Full textMoline, Judi, and Steve Otto. Electronic access:. Gaithersburg, MD: National Institute of Standards and Technology, 1995. http://dx.doi.org/10.6028/nist.ir.5616.
Full textPerini, Sofía C., Agustín Tejeda Rodríguez, Cristian Morales Opazo, Regine Weber, and Silvia Helena Galvao de Miranda. Market access. Washington, DC: International Food Policy Research Institute, 2021. http://dx.doi.org/10.2499/p15738coll2.134832.
Full textCook, N. Internet Message Access Protocol (IMAP) - URL Access Identifier Extension. RFC Editor, June 2009. http://dx.doi.org/10.17487/rfc5593.
Full textKanugovi, S., F. Baboescu, J. Zhu, and S. Seo. Multiple Access Management Services Multi-Access Management Services (MAMS). RFC Editor, March 2020. http://dx.doi.org/10.17487/rfc8743.
Full textHadfield, Amelia, and Andrej J. Zwitter. Open Access Publishing. Librello, July 2013. http://dx.doi.org/10.12924/pag2013.01020102.
Full textKirsch, Emily. Access Innovation (Final). Office of Scientific and Technical Information (OSTI), April 2020. http://dx.doi.org/10.2172/1615933.
Full textKrishna, Kala, Suddhasatwa Roy, and Marie Thursby. Implementing Market Access. Cambridge, MA: National Bureau of Economic Research, May 1996. http://dx.doi.org/10.3386/w5593.
Full textKrishna, Kala, Suddhasatwa Roy, and Marie Thursby. Procompetitive Market Access. Cambridge, MA: National Bureau of Economic Research, September 1997. http://dx.doi.org/10.3386/w6184.
Full text