Academic literature on the topic 'Computer networks – Access control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks – Access control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer networks – Access control"
Russell, D. "Access Control Techniques and Their Impact on User Accessibility in Computer Networks." SIJ Transactions on Computer Networks & Communication Engineering 7, no. 5 (October 31, 2019): 16–19. http://dx.doi.org/10.9756/sijcnce/v7i5/07051014.
Full textSlabyshev, Mykhailo O., and Anatolij G. Berdnikov. "Model of control access process in wireless computer network." 47, no. 47 (September 28, 2020): 72–79. http://dx.doi.org/10.26565/2304-6201-2020-47-06.
Full textKarger, Paul A. "Authentication and discretionary access control in computer networks." Computers & Security 5, no. 4 (December 1986): 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.
Full textKarger, Paul A. "Authentication and discretionary access control in computer networks." Computer Networks and ISDN Systems 10, no. 1 (August 1985): 27–37. http://dx.doi.org/10.1016/0169-7552(85)90036-4.
Full textKim, Dae-Young, Dae-sik Ko, and Seokhoon Kim. "Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks." Mobile Information Systems 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/6195024.
Full textNour, Boubakr, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, and Hassine Moungla. "Access Control Mechanisms in Named Data Networks." ACM Computing Surveys 54, no. 3 (June 2021): 1–35. http://dx.doi.org/10.1145/3442150.
Full textAlicea, Michael, and Izzat Alsmadi. "Misconfiguration in Firewalls and Network Access Controls: Literature Review." Future Internet 13, no. 11 (November 8, 2021): 283. http://dx.doi.org/10.3390/fi13110283.
Full textHabib, Ibrahim W., and Tarek N. Saadawi. "Access flow control algorithms in broadband networks." Computer Communications 15, no. 5 (June 1992): 326–32. http://dx.doi.org/10.1016/0140-3664(92)90093-t.
Full textAli, Muneeb, Umar Saif, Adam Dunkels, Thiemo Voigt, Kay Römer, Koen Langendoen, Joseph Polastre, and Zartash Afzal Uzmi. "Medium access control issues in sensor networks." ACM SIGCOMM Computer Communication Review 36, no. 2 (April 28, 2006): 33–36. http://dx.doi.org/10.1145/1129582.1129592.
Full textHarikrishnan, Harshini, Aarjish Sarkar, Shams Al Ajrawi, Albena Mihovska, and Christopher Paolini. "Medium Access Control Protocols for Brain Computer Interface Applications." International Journal of Interdisciplinary Telecommunications and Networking 13, no. 2 (April 2021): 24–41. http://dx.doi.org/10.4018/ijitn.2021040103.
Full textDissertations / Theses on the topic "Computer networks – Access control"
Withrow, Gary W. "An access control middleware application." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/GWithrow2006.pdf.
Full textFisher, Craig. "Network access control disruptive technology? /." [Denver, Colo.] : Regis University, 2008. http://165.236.235.140/lib/JFisher2007.pdf.
Full textNayak, Ankur Kumar. "Flexible access control for campus and enterprise networks." Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33813.
Full textDuff, Kevin Craig. "Network-layer reservation TDM for ad-hoc 802.11 networks." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1146/.
Full textZhang, Zhixiong. "Scalable role & organization based access control and its administration." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3110.
Full textVita: p. 121. Thesis directors: Ravi S. Sandhu, Daniel Menascé. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed July 7, 2008). Includes bibliographical references (p. 113-120). Also issued in print.
Manian, Vijay. "Access control model for Distributed Conferencing System." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000570.
Full textVillegas, Wilfred. "A trust-based access control scheme for social networks." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=22020.
Full textLes données personnelles publiées sur internet par l'entremise des nouveaux réseaux sociaux virtuels présentent des défis considérables en ce qui attrait à l'échange numérique. Cette thèse propose un système de contrôle d'accès appelé Personal Data Access Control, ou PDAC, qui permet aux utilisateurs d'échanger leurs données personnelles avec leurs amis de façon mesurée, en utilisant un calcul de confiance. Ce calcul de confiance utilise comme critères d'évaluation les interactions antérieures entre l'utilisateur et chacun de ses amis afin de classer chacune de ses connaissances dans une de trois zones de protection. Ces zones délimitent le niveau d'accès accordé aux données de l'utilisateur. De plus, l'utilisateur peut assigner certains amis come vérificateurs qui donnent leur approbation et ainsi détermine en toute confidentialité qui devrait avoir accès a ses données. Nos résultats d'analyse démontrent que le PDAC accorde privilèges d'accès aux données de façon efficace. Ces simulations démontrent aussi que le PDAC préserve la confidentialité en saisissant les niveaux de confiance qui existe dans les réseaux sociaux virtuels d'aujourd'hui actuels.
Kohagura, Monique Sachie. "Local coordination medium access control for wireless sensor networks." Online access for everyone, 2008. http://www.dissertations.wsu.edu/Thesis/Summer2008/m_kohagura_050808.pdf.
Full textFu, Kevin E. (Kevin Edward) 1976. "Integrity and access control in untrusted content distribution networks." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34464.
Full textVita.
Includes bibliographical references (p. 129-142).
A content distribution network (CDN) makes a publisher's content highly available to readers through replication on remote computers. Content stored on untrusted servers is susceptible to attack, but a reader should have confidence that content originated from the publisher and that the content is unmodified. This thesis presents the SFS read-only file system (SFSRO) and key regression in the Chefs file system for secure, efficient content distribution using untrusted servers for public and private content respectively. SFSRO ensures integrity, authenticity, and freshness of single-writer, many-reader content. A publisher creates a digitally-signed database representing the contents of a source file system. Untrusted servers replicate the database for high availability. Chefs extends SFSRO with key regression to support decentralized access control of private content protected by encryption. Key regression allows a client to derive past versions of a key, reducing the number of keys a client must fetch from the publisher. Thus, key regression reduces the bandwidth requirements of publisher to make keys available to many clients.
(cont.) Contributions of this thesis include the design and implementation of SFSRO and Chefs; a concrete definition of security, provably-secure constructions, and an implementation of key regression; and a performance evaluation of SFSRO and Chefs confirming that latency for individual clients remains low, and a single server can support many simultaneous clients.
by Kevin E. Fu.
Ph.D.
Yu, Fan. "Self organization in medium access control for wireless ad hoc and sensor networks." Diss., Connect to online resource - MSU authorized users, 2008.
Find full textBooks on the topic "Computer networks – Access control"
Ferraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.
Find full text1973-, Wu Hongyi, and Pan Yi 1960-, eds. Medium access control in wireless networks. New York: Nova Science Publishers, 2008.
Find full textWang, Ping. Distributed Medium Access Control in Wireless Networks. New York, NY: Springer New York, 2013.
Find full textAccess control systems: Security, identity, management, and trust models. New York: Springer, 2005.
Find full textElli, Kartsakli, ed. Contention-based collision-resolution medium access control algorithms. New York: Nova Science Publishers, 2009.
Find full textKerberos: The Definitive Guide. Beijing: O'Reilly, 2003.
Find full text1961-, Hopkins Ronald D., and Tokere Wesley P, eds. Computer security: Intrusion, detection, and prevention. Hauppauge, NY: Nova Science Publishers, 2009.
Find full textCisco IOS access lists. Sebastopol, CA: O'Reilly & Associates, 2001.
Find full textLehnert, Volker. Authorizations in SAP software: Design and configuration. Boston: Galileo Press, 2010.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. Certification Study Guide Series: IBM Tivoli Federated Identity Manager 6.1. Poughkeepsie, NY: IBM, International Technical Support Organization, 2009.
Find full textBook chapters on the topic "Computer networks – Access control"
De Capitani diVimercati, Sabrina, Sara Foresti, Stefano Paraboschi, and Pierangela Samarati. "Access Control." In Handbook of Computer Networks, 518–38. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch33.
Full textHolt, Alan, and Chi-Yu Huang. "Medium Access Control." In Computer Communications and Networks, 35–50. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-275-9_3.
Full textGebali, Fayez. "Modeling Medium Access Control Protocols." In Analysis of Computer Networks, 337–70. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15657-6_10.
Full textNife, Fahad, and Zbigniew Kotulski. "New SDN-Oriented Authentication and Access Control Mechanism." In Computer Networks, 74–88. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92459-5_7.
Full textFreer, John R. "Network topologies, switching and access control." In Computer Communications and Networks, 101–32. Boston, MA: Springer US, 1988. http://dx.doi.org/10.1007/978-1-4613-1041-9_4.
Full textGebali, Fayez. "Modeling Medium Access Control Protocols." In Analysis of Computer and Communication Networks, 1–58. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-74437-7_10.
Full textHuang, Feiyi, and Yang Yang. "Medium Access Control in Wireless Mesh Networks." In Computer Communications and Networks, 31–48. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84800-909-7_2.
Full textLi, Gang, and Robin Doss. "Energy-Efficient Medium Access Control in Wireless Sensor Networks." In Computer Communications and Networks, 419–38. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-218-4_16.
Full textKim, Dong-Seong, and Hoa Tran-Dang. "802.11 Medium Access Control DCF and PCF: Performance Comparison." In Computer Communications and Networks, 173–79. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04927-0_13.
Full textKizza, Joseph Migga. "Access Control and Authorization." In Guide to Computer Network Security, 185–204. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_9.
Full textConference papers on the topic "Computer networks – Access control"
dos Santos, Andre L. M., Vincent Scarlata, Anderson C. Lima, Inacio C. Alves, and Davi di C. Sampaio. "SACM: Stateful Access Control Model." In 2011 IEEE 36th Conference on Local Computer Networks (LCN 2011). IEEE, 2011. http://dx.doi.org/10.1109/lcn.2011.6115176.
Full textIslam, Salekul, and J. William Atwood. "Sender Access Control in IP Multicast." In 32nd IEEE Conference on Local Computer Networks (LCN 2007). IEEE, 2007. http://dx.doi.org/10.1109/lcn.2007.53.
Full textLi, Huaming, and Jindong Tan. "Medium Access Control for Body Sensor Networks." In 2007 16th International Conference on Computer Communications and Networks. IEEE, 2007. http://dx.doi.org/10.1109/icccn.2007.4317821.
Full textShukla, Piyush Kumar, S. Silakari, S. S. Bhadouria, Kavindra Raghuvanshi, and Mitesh Bargadiya. "An Adaptive Medium Access Control Protocol for Computer Network." In 2009 First International Conference on Computational Intelligence, Communication Systems and Networks (CICSYN). IEEE, 2009. http://dx.doi.org/10.1109/cicsyn.2009.87.
Full textYang, Lei, Hongseok Kim, Junshan Zhang, Mung Chiang, and Chee Wei Tan. "Pricing-based spectrum access control in cognitive radio networks with random access." In IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. IEEE, 2011. http://dx.doi.org/10.1109/infcom.2011.5935038.
Full textSeleznyov, A., and S. Hailes. "Distributed knowledge management for autonomous access control in computer networks." In International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. IEEE, 2004. http://dx.doi.org/10.1109/itcc.2004.1286686.
Full textGraupner, Hendrik, Kennedy Torkura, Philipp Berger, Christoph Meinel, and Maxim Schnjakin. "Secure access control for multi-cloud resources." In 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops). IEEE, 2015. http://dx.doi.org/10.1109/lcnw.2015.7365920.
Full textAlkhwlani, M. M., and A. Ayesh. "Access network selection using combined fuzzy control and MCDM in heterogeneous networks." In 2007 International Conference on Computer Engineering & Systems. IEEE, 2007. http://dx.doi.org/10.1109/icces.2007.4447034.
Full textCarofiglio, Giovanna, Alberto Compagno, Mauro Conti, Fabio De Gaspari, and Luca Muscariello. "IaaS-Aided Access Control for Information-Centric IoT." In 2018 IEEE 43rd Conference on Local Computer Networks (LCN). IEEE, 2018. http://dx.doi.org/10.1109/lcn.2018.8638228.
Full textAthanasiou, George, Pradeep Chathuranga Weeraddana, and Carlo Fischione. "Association control in millimeterWave wireless access networks." In 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, 2014. http://dx.doi.org/10.1109/camad.2014.7033246.
Full textReports on the topic "Computer networks – Access control"
Wadhwa, S., J. Moisand, T. Haag, and N. Voigt. Protocol for Access Node Control Mechanism in Broadband Networks. Edited by T. Taylor. RFC Editor, October 2011. http://dx.doi.org/10.17487/rfc6320.
Full textRubin, Izhak, and Mario Gerla. Performance Evaluation and Control of Distributed Computer Communication Networks. Fort Belvoir, VA: Defense Technical Information Center, September 1985. http://dx.doi.org/10.21236/ada170810.
Full textHaag, T., and H. Li. Applicability of the Access Node Control Mechanism to Broadband Networks Based on Passive Optical Networks (PONs). Edited by N. Bitar and S. Wadhwa. RFC Editor, June 2013. http://dx.doi.org/10.17487/rfc6934.
Full textHoffman, L. The Formulary Model for Access Control and Privacy in Computer Systems. Office of Scientific and Technical Information (OSTI), June 2018. http://dx.doi.org/10.2172/1453881.
Full textOoghe, S., N. Voigt, M. Platnic, T. Haag, and S. Wadhwa. Framework and Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks. RFC Editor, May 2010. http://dx.doi.org/10.17487/rfc5851.
Full textCheng, Julian. Integrated Wavelength-Space-Time Optical Multiplexing Technologies and Architectures for Large-Scale, Reconfigurable, Multiple-Access Computer Networks. Fort Belvoir, VA: Defense Technical Information Center, March 2000. http://dx.doi.org/10.21236/ada375981.
Full textStevens, James A. Spatial Reuse through Dynamic Power and Routing Control in Common-Channel Random-Access Packet Radio Networks. Fort Belvoir, VA: Defense Technical Information Center, August 1988. http://dx.doi.org/10.21236/ada197898.
Full textYe, Nong. A Process Control and Diagnosis Approach to Indications and Warning of Attacks on Computer Networks. Fort Belvoir, VA: Defense Technical Information Center, October 2001. http://dx.doi.org/10.21236/ada397978.
Full textRolston, Bri. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks. Office of Scientific and Technical Information (OSTI), June 2005. http://dx.doi.org/10.2172/911827.
Full textCrooks, Roderic. Toward People’s Community Control of Technology: Race, Access, and Education. Social Science Research Council, January 2022. http://dx.doi.org/10.35650/jt.3015.d.2022.
Full text