Academic literature on the topic 'Computer networks – Access control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks – Access control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks – Access control"

1

Russell, D. "Access Control Techniques and Their Impact on User Accessibility in Computer Networks." SIJ Transactions on Computer Networks & Communication Engineering 7, no. 5 (October 31, 2019): 16–19. http://dx.doi.org/10.9756/sijcnce/v7i5/07051014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Slabyshev, Mykhailo O., and Anatolij G. Berdnikov. "Model of control access process in wireless computer network." 47, no. 47 (September 28, 2020): 72–79. http://dx.doi.org/10.26565/2304-6201-2020-47-06.

Full text
Abstract:
The problem of ensuring the minimum delivery time of information with prevention of collisions is a pressing problem in ACS TP, since collisions often occur during transmission or the delay time of information is not optimal. This problem is solved by the use of wireless computer networks and methods of information transmission with collision prevention, which affect the delay time of information transmission. The developed model of the access control process in wireless computer networks solves the problem of effective information transfer with collision prevention. The purpose of using this model is to reduce the delay in information transmission. ACS TP often needs modernization as technical innovations are becoming available. At the same time, the quality of production should not fluctuate. The most important element of modernization is the use of wireless technologies that save money and time, compared to the deployment of wired networks. The aim of the work is to develop the model of control access process in a wireless computer network with collision prevention. The process of forming delay slots for information transfer has been researched. The object of the study is a wireless computer network in the ACS TP. The subject of the study is a model of control access process in a wireless computer network with collision prevention. The research objectives are to create requirements for the model, to propose a structure, to create a model, to conduct tests and evaluate the obtained results. The model of access control process in a wireless computer network designed to transmit information with prevention of collisions in a wireless computer network has been developed.
APA, Harvard, Vancouver, ISO, and other styles
3

Karger, Paul A. "Authentication and discretionary access control in computer networks." Computers & Security 5, no. 4 (December 1986): 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Karger, Paul A. "Authentication and discretionary access control in computer networks." Computer Networks and ISDN Systems 10, no. 1 (August 1985): 27–37. http://dx.doi.org/10.1016/0169-7552(85)90036-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Dae-Young, Dae-sik Ko, and Seokhoon Kim. "Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks." Mobile Information Systems 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/6195024.

Full text
Abstract:
Recent advances in information communication technology and software have enabled mobile terminals to employ various capabilities as a smartphone. They adopt multiple interfaces for wireless communication and run as a portable computer. Mobile services are also transferred from voice to data. Mobile terminals can access Internet for data services anytime anywhere. By using location-based information, improved mobile services are enabled in heterogeneous networks. In the mobile service environment, it is required that mobile terminals should efficiently use wireless network resources. In addition, because video stream becomes a major service among the data services of mobile terminals in heterogeneous networks, the necessity of the efficient network access control for heterogeneous wireless networks is raised as an important topic. That is, quality of services of the location-based video stream is determined by the network access control. Therefore, this paper proposes a novel network access control in the heterogeneous wireless networks. The proposed method estimates the network status with Naïve Bayesian Classifier and performs network access control according to the estimated network status. Thus, it improves data transmission efficiency to satisfy the quality of services. The efficiency of the proposed method is validated through the extensive computer simulation.
APA, Harvard, Vancouver, ISO, and other styles
6

Nour, Boubakr, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, and Hassine Moungla. "Access Control Mechanisms in Named Data Networks." ACM Computing Surveys 54, no. 3 (June 2021): 1–35. http://dx.doi.org/10.1145/3442150.

Full text
Abstract:
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC . Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.
APA, Harvard, Vancouver, ISO, and other styles
7

Alicea, Michael, and Izzat Alsmadi. "Misconfiguration in Firewalls and Network Access Controls: Literature Review." Future Internet 13, no. 11 (November 8, 2021): 283. http://dx.doi.org/10.3390/fi13110283.

Full text
Abstract:
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control network traffic. In this paper, we evaluated recent research trends and open challenges related to firewalls and access controls in general and misconfiguration problems in particular. With the recent advances in next-generation (NG) firewalls, firewall roles can be auto-generated based on networks and threats. Nonetheless, and due to the large number of roles in any medium to large networks, roles’ misconfiguration may occur for several reasons and will impact the performance of the firewall and overall network and protection efficiency.
APA, Harvard, Vancouver, ISO, and other styles
8

Habib, Ibrahim W., and Tarek N. Saadawi. "Access flow control algorithms in broadband networks." Computer Communications 15, no. 5 (June 1992): 326–32. http://dx.doi.org/10.1016/0140-3664(92)90093-t.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ali, Muneeb, Umar Saif, Adam Dunkels, Thiemo Voigt, Kay Römer, Koen Langendoen, Joseph Polastre, and Zartash Afzal Uzmi. "Medium access control issues in sensor networks." ACM SIGCOMM Computer Communication Review 36, no. 2 (April 28, 2006): 33–36. http://dx.doi.org/10.1145/1129582.1129592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Harikrishnan, Harshini, Aarjish Sarkar, Shams Al Ajrawi, Albena Mihovska, and Christopher Paolini. "Medium Access Control Protocols for Brain Computer Interface Applications." International Journal of Interdisciplinary Telecommunications and Networking 13, no. 2 (April 2021): 24–41. http://dx.doi.org/10.4018/ijitn.2021040103.

Full text
Abstract:
Noteworthy advancements have occurred in the field of brain computer interfaces (BCI) in the last decade. The transmission of the collected signals to the corresponding organ through a wireless link is still in a nascent stage. This paper investigates the feasibility of having multiple UHF-RFID transmitters inside the skull which communicate to the receiver outside. The purpose of this paper is to design a wireless communication channel and enhance the communication using a MAC protocol. The existing MAC protocols were analyzed to be used in a BCI application. Though the combination of existing protocols seems like a possibility to use in a BCI system, the complexity of such a protocol is high. This drawback is overcome by proposing a novel MAC protocol. The performance of the proposed MAC algorithm is related with the widely used Q algorithm for anti-collision in the RFID tags. Parameters like delay and collisions are analyzed in detail which are essential to build a consistent, energy efficient, and a low power BCI system.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer networks – Access control"

1

Withrow, Gary W. "An access control middleware application." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/GWithrow2006.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fisher, Craig. "Network access control disruptive technology? /." [Denver, Colo.] : Regis University, 2008. http://165.236.235.140/lib/JFisher2007.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nayak, Ankur Kumar. "Flexible access control for campus and enterprise networks." Thesis, Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33813.

Full text
Abstract:
We consider the problem of designing enterprise network security systems which are easy to manage, robust and flexible. This problem is challenging. Today, most approaches rely on host security, middleboxes, and complex interactions between many protocols. To solve this problem, we explore how new programmable networking paradigms can facilitate fine-grained network control. We present Resonance, a system for securing enterprise networks , where the network elements themselves en- force dynamic access control policies through state changes based on both flow-level information and real-time alerts. Resonance uses programmable switches to manipulate traffic at lower layers; these switches take actions (e.g., dropping or redirecting traffic) to enforce high-level security policies based on input from both higher-level security boxes and distributed monitoring and inference systems. Using our approach, administrators can create security applications by first identifying a state machine to represent different policy changes and then, translating these states into actual network policies. Earlier approaches in this direction (e.g., Ethane, Sane) have remained low-level requiring policies to be written in languages which are too detailed and are difficult for regular users and administrators to comprehend. As a result, significant effort is needed to package policies, events and network devices into a high-level application. Resonance abstracts out all the details through its state-machine based policy specification framework and presents security functions which are close to the end system and hence, more tractable. To demonstrate how well Resonance can be applied to existing systems, we consider two use cases. First relates to "Network Admission Control" problem. Georgia Tech dormitories currently use a system called START (Scanning Technology for Automated Registration, Repair, and Response Tasks) to authenticate and secure new hosts entering the network [23]. START uses a VLAN-based approach to isolate new hosts from authenticated hosts, along with a series of network device interactions. VLANs are notoriously difficult to use, requiring much hand-holding and manual configuration. Our interactions with the dorm network administrators have revealed that this existing system is not only difficult to manage and scale but also inflexible, allowing only coarse-grained access control. We implemented START by expressing its functions in the Resonance framework. The current system is deployed across three buildings in Georgia Tech with both wired as well as wireless connectivities. We present an evaluation of our system's scalability and performance. We consider dynamic rate limiting as the second use case for Resonance. We show how a network policy that relies on rate limiting and traffic shaping can easily be implemented using only a few state transitions. We plan to expand our deployment to more users and buildings and support more complex policies as an extension to our ongoing work. Main contributions of this thesis include design and implementation of a flexible access control model, evaluation studies of our system's scalability and performance, and a campus-wide testbed setup with a working version of Resonance running. Our preliminary evaluations suggest that Resonance is scalable and can be potentially deployed in production networks. Our work can provide a good platform for more advanced and powerful security techniques for enterprise networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Duff, Kevin Craig. "Network-layer reservation TDM for ad-hoc 802.11 networks." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1146/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Zhixiong. "Scalable role & organization based access control and its administration." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3110.

Full text
Abstract:
Thesis (Ph.D.)--George Mason University, 2008.
Vita: p. 121. Thesis directors: Ravi S. Sandhu, Daniel Menascé. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed July 7, 2008). Includes bibliographical references (p. 113-120). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
6

Manian, Vijay. "Access control model for Distributed Conferencing System." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE0000570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Villegas, Wilfred. "A trust-based access control scheme for social networks." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=22020.

Full text
Abstract:
The personal data being published on online social networks is presenting new challenges in sharing of this digital content. This thesis proposes an access control scheme called Personal Data Access Control, or PDAC, which allows users to share data among their friends, using a trust computation to determine which friends should be given access. This trust computation uses previous interactions among a user's friends to classify his or her peers into one of three protection zones, which determine whether that peer gains access to the user's data. Additionally, the user may designate certain friends as attesters who will aid the user in determining which peers are trustworthy enough to be given access to his or her data. Simulations of the PDAC scheme were performed to evaluate its effectiveness in enforcing data access privileges. The results show that PDAC preserves confidentiality by exploiting the trust that is captured in existing social networks.
Les données personnelles publiées sur internet par l'entremise des nouveaux réseaux sociaux virtuels présentent des défis considérables en ce qui attrait à l'échange numérique. Cette thèse propose un système de contrôle d'accès appelé Personal Data Access Control, ou PDAC, qui permet aux utilisateurs d'échanger leurs données personnelles avec leurs amis de façon mesurée, en utilisant un calcul de confiance. Ce calcul de confiance utilise comme critères d'évaluation les interactions antérieures entre l'utilisateur et chacun de ses amis afin de classer chacune de ses connaissances dans une de trois zones de protection. Ces zones délimitent le niveau d'accès accordé aux données de l'utilisateur. De plus, l'utilisateur peut assigner certains amis come vérificateurs qui donnent leur approbation et ainsi détermine en toute confidentialité qui devrait avoir accès a ses données. Nos résultats d'analyse démontrent que le PDAC accorde privilèges d'accès aux données de façon efficace. Ces simulations démontrent aussi que le PDAC préserve la confidentialité en saisissant les niveaux de confiance qui existe dans les réseaux sociaux virtuels d'aujourd'hui actuels.
APA, Harvard, Vancouver, ISO, and other styles
8

Kohagura, Monique Sachie. "Local coordination medium access control for wireless sensor networks." Online access for everyone, 2008. http://www.dissertations.wsu.edu/Thesis/Summer2008/m_kohagura_050808.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fu, Kevin E. (Kevin Edward) 1976. "Integrity and access control in untrusted content distribution networks." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/34464.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2005.
Vita.
Includes bibliographical references (p. 129-142).
A content distribution network (CDN) makes a publisher's content highly available to readers through replication on remote computers. Content stored on untrusted servers is susceptible to attack, but a reader should have confidence that content originated from the publisher and that the content is unmodified. This thesis presents the SFS read-only file system (SFSRO) and key regression in the Chefs file system for secure, efficient content distribution using untrusted servers for public and private content respectively. SFSRO ensures integrity, authenticity, and freshness of single-writer, many-reader content. A publisher creates a digitally-signed database representing the contents of a source file system. Untrusted servers replicate the database for high availability. Chefs extends SFSRO with key regression to support decentralized access control of private content protected by encryption. Key regression allows a client to derive past versions of a key, reducing the number of keys a client must fetch from the publisher. Thus, key regression reduces the bandwidth requirements of publisher to make keys available to many clients.
(cont.) Contributions of this thesis include the design and implementation of SFSRO and Chefs; a concrete definition of security, provably-secure constructions, and an implementation of key regression; and a performance evaluation of SFSRO and Chefs confirming that latency for individual clients remains low, and a single server can support many simultaneous clients.
by Kevin E. Fu.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
10

Yu, Fan. "Self organization in medium access control for wireless ad hoc and sensor networks." Diss., Connect to online resource - MSU authorized users, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer networks – Access control"

1

Ferraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1973-, Wu Hongyi, and Pan Yi 1960-, eds. Medium access control in wireless networks. New York: Nova Science Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Ping. Distributed Medium Access Control in Wireless Networks. New York, NY: Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Access control systems: Security, identity, management, and trust models. New York: Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Elli, Kartsakli, ed. Contention-based collision-resolution medium access control algorithms. New York: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kerberos: The Definitive Guide. Beijing: O'Reilly, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1961-, Hopkins Ronald D., and Tokere Wesley P, eds. Computer security: Intrusion, detection, and prevention. Hauppauge, NY: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cisco IOS access lists. Sebastopol, CA: O'Reilly & Associates, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lehnert, Volker. Authorizations in SAP software: Design and configuration. Boston: Galileo Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

International Business Machines Corporation. International Technical Support Organization, ed. Certification Study Guide Series: IBM Tivoli Federated Identity Manager 6.1. Poughkeepsie, NY: IBM, International Technical Support Organization, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer networks – Access control"

1

De Capitani diVimercati, Sabrina, Sara Foresti, Stefano Paraboschi, and Pierangela Samarati. "Access Control." In Handbook of Computer Networks, 518–38. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Holt, Alan, and Chi-Yu Huang. "Medium Access Control." In Computer Communications and Networks, 35–50. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-275-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gebali, Fayez. "Modeling Medium Access Control Protocols." In Analysis of Computer Networks, 337–70. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15657-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nife, Fahad, and Zbigniew Kotulski. "New SDN-Oriented Authentication and Access Control Mechanism." In Computer Networks, 74–88. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92459-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Freer, John R. "Network topologies, switching and access control." In Computer Communications and Networks, 101–32. Boston, MA: Springer US, 1988. http://dx.doi.org/10.1007/978-1-4613-1041-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gebali, Fayez. "Modeling Medium Access Control Protocols." In Analysis of Computer and Communication Networks, 1–58. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-74437-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Huang, Feiyi, and Yang Yang. "Medium Access Control in Wireless Mesh Networks." In Computer Communications and Networks, 31–48. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84800-909-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Gang, and Robin Doss. "Energy-Efficient Medium Access Control in Wireless Sensor Networks." In Computer Communications and Networks, 419–38. London: Springer London, 2009. http://dx.doi.org/10.1007/978-1-84882-218-4_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Dong-Seong, and Hoa Tran-Dang. "802.11 Medium Access Control DCF and PCF: Performance Comparison." In Computer Communications and Networks, 173–79. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04927-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kizza, Joseph Migga. "Access Control and Authorization." In Guide to Computer Network Security, 185–204. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer networks – Access control"

1

dos Santos, Andre L. M., Vincent Scarlata, Anderson C. Lima, Inacio C. Alves, and Davi di C. Sampaio. "SACM: Stateful Access Control Model." In 2011 IEEE 36th Conference on Local Computer Networks (LCN 2011). IEEE, 2011. http://dx.doi.org/10.1109/lcn.2011.6115176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Islam, Salekul, and J. William Atwood. "Sender Access Control in IP Multicast." In 32nd IEEE Conference on Local Computer Networks (LCN 2007). IEEE, 2007. http://dx.doi.org/10.1109/lcn.2007.53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Huaming, and Jindong Tan. "Medium Access Control for Body Sensor Networks." In 2007 16th International Conference on Computer Communications and Networks. IEEE, 2007. http://dx.doi.org/10.1109/icccn.2007.4317821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shukla, Piyush Kumar, S. Silakari, S. S. Bhadouria, Kavindra Raghuvanshi, and Mitesh Bargadiya. "An Adaptive Medium Access Control Protocol for Computer Network." In 2009 First International Conference on Computational Intelligence, Communication Systems and Networks (CICSYN). IEEE, 2009. http://dx.doi.org/10.1109/cicsyn.2009.87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Lei, Hongseok Kim, Junshan Zhang, Mung Chiang, and Chee Wei Tan. "Pricing-based spectrum access control in cognitive radio networks with random access." In IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. IEEE, 2011. http://dx.doi.org/10.1109/infcom.2011.5935038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Seleznyov, A., and S. Hailes. "Distributed knowledge management for autonomous access control in computer networks." In International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. IEEE, 2004. http://dx.doi.org/10.1109/itcc.2004.1286686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Graupner, Hendrik, Kennedy Torkura, Philipp Berger, Christoph Meinel, and Maxim Schnjakin. "Secure access control for multi-cloud resources." In 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops). IEEE, 2015. http://dx.doi.org/10.1109/lcnw.2015.7365920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alkhwlani, M. M., and A. Ayesh. "Access network selection using combined fuzzy control and MCDM in heterogeneous networks." In 2007 International Conference on Computer Engineering & Systems. IEEE, 2007. http://dx.doi.org/10.1109/icces.2007.4447034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Carofiglio, Giovanna, Alberto Compagno, Mauro Conti, Fabio De Gaspari, and Luca Muscariello. "IaaS-Aided Access Control for Information-Centric IoT." In 2018 IEEE 43rd Conference on Local Computer Networks (LCN). IEEE, 2018. http://dx.doi.org/10.1109/lcn.2018.8638228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Athanasiou, George, Pradeep Chathuranga Weeraddana, and Carlo Fischione. "Association control in millimeterWave wireless access networks." In 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, 2014. http://dx.doi.org/10.1109/camad.2014.7033246.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer networks – Access control"

1

Wadhwa, S., J. Moisand, T. Haag, and N. Voigt. Protocol for Access Node Control Mechanism in Broadband Networks. Edited by T. Taylor. RFC Editor, October 2011. http://dx.doi.org/10.17487/rfc6320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rubin, Izhak, and Mario Gerla. Performance Evaluation and Control of Distributed Computer Communication Networks. Fort Belvoir, VA: Defense Technical Information Center, September 1985. http://dx.doi.org/10.21236/ada170810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haag, T., and H. Li. Applicability of the Access Node Control Mechanism to Broadband Networks Based on Passive Optical Networks (PONs). Edited by N. Bitar and S. Wadhwa. RFC Editor, June 2013. http://dx.doi.org/10.17487/rfc6934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hoffman, L. The Formulary Model for Access Control and Privacy in Computer Systems. Office of Scientific and Technical Information (OSTI), June 2018. http://dx.doi.org/10.2172/1453881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ooghe, S., N. Voigt, M. Platnic, T. Haag, and S. Wadhwa. Framework and Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks. RFC Editor, May 2010. http://dx.doi.org/10.17487/rfc5851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cheng, Julian. Integrated Wavelength-Space-Time Optical Multiplexing Technologies and Architectures for Large-Scale, Reconfigurable, Multiple-Access Computer Networks. Fort Belvoir, VA: Defense Technical Information Center, March 2000. http://dx.doi.org/10.21236/ada375981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stevens, James A. Spatial Reuse through Dynamic Power and Routing Control in Common-Channel Random-Access Packet Radio Networks. Fort Belvoir, VA: Defense Technical Information Center, August 1988. http://dx.doi.org/10.21236/ada197898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ye, Nong. A Process Control and Diagnosis Approach to Indications and Warning of Attacks on Computer Networks. Fort Belvoir, VA: Defense Technical Information Center, October 2001. http://dx.doi.org/10.21236/ada397978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rolston, Bri. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks. Office of Scientific and Technical Information (OSTI), June 2005. http://dx.doi.org/10.2172/911827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Crooks, Roderic. Toward People’s Community Control of Technology: Race, Access, and Education. Social Science Research Council, January 2022. http://dx.doi.org/10.35650/jt.3015.d.2022.

Full text
Abstract:
This field review explores how the benefits of access to computing for racialized and minoritized communities has become an accepted fact in policy and research, despite decades of evidence that technical fixes do not solve the kinds of complex social problems that disproportionately affect these communities. I use the digital divide framework—a 1990s policy diagnosis that argues that the growth and success of the internet would bifurcate the public into digital “haves” and “have-nots”—as a lens to look at why access to computing frequently appears as a means to achieve economic, political, and social equality for racialized and minoritized communities. First, I present a brief cultural history of computer-assisted instruction to show that widely-held assumptions about the educational utility of computing emerged from utopian narratives about scientific progress and innovation—narratives that also traded on raced and gendered assumptions about users of computers. Next, I use the advent of the digital divide framework and its eventual transformation into digital inequality research to show how those raced and gendered norms about computing and computer users continue to inform research on information and communication technologies (ICTs) used in educational contexts. This is important because the norms implicated in digital divide research are also present in other sites where technology and civic life intersect, including democratic participation, public health, and immigration, among others. I conclude by arguing that naïve or cynical deployments of computing technology can actually harm or exploit the very same racialized and minoritized communities that access is supposed to benefit. In short, access to computing in education—or in any other domain—can only meaningfully contribute to equality when minoritized and racialized communities are allowed to pursue their own collective goals.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography