Artículos de revistas sobre el tema "Data access control policies"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Data access control policies".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Jain, Taniya. "Secure Big Data Access Control Policies for Cloud Computing Environment". International Journal of Innovative Research in Computer Science & Technology 5, n.º 2 (31 de marzo de 2017): 253–56. http://dx.doi.org/10.21276/ijircst.2017.5.2.8.
Texto completoBouganim, Luc, Francois Dang Ngoc y Philippe Pucheral. "Dynamic access-control policies on XML encrypted data". ACM Transactions on Information and System Security 10, n.º 4 (enero de 2008): 1–37. http://dx.doi.org/10.1145/1284680.1284684.
Texto completoBrewster, Christopher, Barry Nouwt, Stephan Raaijmakers y Jack Verhoosel. "Ontology-based Access Control for FAIR Data". Data Intelligence 2, n.º 1-2 (enero de 2020): 66–77. http://dx.doi.org/10.1162/dint_a_00029.
Texto completoAziz, Benjamin. "Towards open data-driven evaluation of access control policies". Computer Standards & Interfaces 56 (febrero de 2018): 13–26. http://dx.doi.org/10.1016/j.csi.2017.09.001.
Texto completoYaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures". Information Resources Management Journal 30, n.º 4 (octubre de 2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.
Texto completoPervez, Zeeshan, Asad Masood Khattak, Sungyoung Lee, Young-Koo Lee y Eui-Nam Huh. "Oblivious access control policies for cloud based data sharing systems". Computing 94, n.º 12 (21 de agosto de 2012): 915–38. http://dx.doi.org/10.1007/s00607-012-0206-z.
Texto completoVenkatesan, G. y K. Ambika. "Indexing Policies in Cloud Information Accountability for Data Sharing". Asian Journal of Computer Science and Technology 2, n.º 1 (5 de mayo de 2013): 22–27. http://dx.doi.org/10.51983/ajcst-2013.2.1.1712.
Texto completoLiu, Gang, Guofang Zhang, Quan Wang, Shaomin Ji y Lizhi Zhang. "Fine-grained access control method for private data in android system". International Journal of Distributed Sensor Networks 15, n.º 3 (marzo de 2019): 155014771984023. http://dx.doi.org/10.1177/1550147719840232.
Texto completoSabitha, S. y M. S. Rajasree. "Access control based privacy preserving secure data sharing with hidden access policies in cloud". Journal of Systems Architecture 75 (abril de 2017): 50–58. http://dx.doi.org/10.1016/j.sysarc.2017.03.002.
Texto completoGuo, Jinyi, Wei Ren, Yi Ren y Tianqin Zhu. "A Watermark-Based in-Situ Access Control Model for Image Big Data". Future Internet 10, n.º 8 (29 de julio de 2018): 69. http://dx.doi.org/10.3390/fi10080069.
Texto completoArunajyothi, G. "Key based Access Control Policies to Solve Security in Cloud Data Sharing". International Journal of Emerging Research in Management and Technology 6, n.º 12 (11 de junio de 2018): 45. http://dx.doi.org/10.23956/ijermt.v6i12.33.
Texto completoMuppavarapu, Vineela y Soon M. Chung. "Semantic-Based Access Control for Data Resources in Open Grid Services Architecture". International Journal of Grid and High Performance Computing 6, n.º 2 (abril de 2014): 1–23. http://dx.doi.org/10.4018/ijghpc.2014040101.
Texto completoMeneka, M. y K. Meenakshisundaram. "An Enhancement Role and Attribute Based Access Control Mechanism in Big Data". International Journal of Electrical and Computer Engineering (IJECE) 8, n.º 5 (1 de octubre de 2018): 3187. http://dx.doi.org/10.11591/ijece.v8i5.pp3187-3193.
Texto completoLakaraju, Sandeep, Dianxiang Xu y Yong Wang. "Analysis of Healthcare Workflows in Accordance with Access Control Policies". International Journal of Healthcare Information Systems and Informatics 11, n.º 1 (enero de 2016): 1–20. http://dx.doi.org/10.4018/ijhisi.2016010101.
Texto completoKuts, D. V. y S. V. Porshnev. "THE FEATURES OF MANDATORY ACCESS CONTROL MODEL IN MODERN UNAUTHORIZED ACCESS DATA PROTECTION TOOLS". Journal of the Ural Federal District. Information security 20, n.º 3 (2020): 27–33. http://dx.doi.org/10.14529/secur200303.
Texto completoLi, Jian y William K. Cheung. "Access Control on Semantic Web Data Using Query Rewriting". International Journal of Organizational and Collective Intelligence 1, n.º 2 (abril de 2010): 46–66. http://dx.doi.org/10.4018/joci.2010040103.
Texto completoShirsath, Rakesh y Dr K. V. Daya Sagar. "A Review of fine grained access control techniques". International Journal of Engineering & Technology 7, n.º 2.7 (18 de marzo de 2018): 20. http://dx.doi.org/10.14419/ijet.v7i2.7.10249.
Texto completoHuang, Jie y Dehua Wu. "Access Control Model Scheme based on Policy Grading in Natural Language Processing Blockchain Environment". Mobile Information Systems 2022 (8 de agosto de 2022): 1–9. http://dx.doi.org/10.1155/2022/4365944.
Texto completoTrojer, Thomas, Basel Katt, Ruth Breu, Thomas Schabetsberger y Richard Mair. "Managing Privacy and Effectiveness of Patient-Administered Authorization Policies". International Journal of Computational Models and Algorithms in Medicine 3, n.º 2 (abril de 2012): 43–62. http://dx.doi.org/10.4018/jcmam.2012040103.
Texto completoSeifermann, Stephan, Robert Heinrich, Dominik Werle y Ralf Reussner. "Detecting violations of access control and information flow policies in data flow diagrams". Journal of Systems and Software 184 (febrero de 2022): 111138. http://dx.doi.org/10.1016/j.jss.2021.111138.
Texto completoTang, Xiao Yong, Jin Wei Li y Gui Ping Liao. "A Trust-Aware Access Control Policy for Cloud Data Protection". Applied Mechanics and Materials 411-414 (septiembre de 2013): 40–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.40.
Texto completoZhang, Jian, Jin Yao y Kun Huang. "Research on Access Control Policy for Confidential Information System". Applied Mechanics and Materials 263-266 (diciembre de 2012): 3064–67. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3064.
Texto completoLi, Teng, Jiawei Zhang, Yanbo Yang, Wei Qiao y Yangxu Lin. "Auditable and Times limitable Secure Data Access Control for Cloud-based Industrial Internet of Things". Journal of Networking and Network Applications 1, n.º 3 (2021): 129–38. http://dx.doi.org/10.33969/j-nana.2021.010306.
Texto completoZheng, Kaifa, Caiyang Ding y Jinchen Wang. "A Secure Data-Sharing Scheme for Privacy-Preserving Supporting Node–Edge–Cloud Collaborative Computation". Electronics 12, n.º 12 (19 de junio de 2023): 2737. http://dx.doi.org/10.3390/electronics12122737.
Texto completoAlattab, Ahmed Abdu, Reyazur Rashid Irshad, Anwar Ali Yahya y Amin A. Al-Awady. "Privacy Protected Preservation of Electric Vehicles’ Data in Cloud Computing Using Secure Data Access Control". Energies 15, n.º 21 (31 de octubre de 2022): 8085. http://dx.doi.org/10.3390/en15218085.
Texto completoEmad F. Khalaf, Emad F. Khalaf. "A Survey of Access Control and Data Encryption for Database Security". journal of King Abdulaziz University Engineering Sciences 28, n.º 1 (4 de enero de 2017): 19–30. http://dx.doi.org/10.4197/eng.28-1.2.
Texto completoIyer, Padmavathi y Amirreza Masoumzadeh. "Learning Relationship-Based Access Control Policies from Black-Box Systems". ACM Transactions on Privacy and Security 25, n.º 3 (31 de agosto de 2022): 1–36. http://dx.doi.org/10.1145/3517121.
Texto completoDemurjian, Steven A., Eugene Sanzi, Thomas P. Agresta y William A. Yasnoff. "Multi-Level Security in Healthcare Using a Lattice-Based Access Control Model". International Journal of Privacy and Health Information Management 7, n.º 1 (enero de 2019): 80–102. http://dx.doi.org/10.4018/ijphim.2019010105.
Texto completoLI, Xinlong. "A Blockchain-Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage". Computational Intelligence and Neuroscience 2022 (27 de abril de 2022): 1–12. http://dx.doi.org/10.1155/2022/2254411.
Texto completoTalha, Mohamed y Anas Abou El Kalam. "Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms". JUCS - Journal of Universal Computer Science 27, n.º 12 (28 de diciembre de 2021): 1300–1324. http://dx.doi.org/10.3897/jucs.77046.
Texto completoKomal, Unnati. "Data Leakage Detection using Cloud Computing". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de mayo de 2023): 3129–32. http://dx.doi.org/10.22214/ijraset.2023.52273.
Texto completoDai, Chang Ying, Wen Tao Gong y Jing Liu. "Access Process of Data-Flow in Cross-Domain Usage Control Model Based on XACML". Advanced Materials Research 143-144 (octubre de 2010): 1275–79. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1275.
Texto completoHaguouche, Samira y Zahi Jarir. "Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism". Security and Communication Networks 2018 (21 de octubre de 2018): 1–13. http://dx.doi.org/10.1155/2018/1572812.
Texto completoPatil, Suraj Krishna, Sandipkumar Chandrakant Sagare y Alankar Shantaram Shelar. "Use of Purpose and Role Based Access Control Mechanisms to Protect Data Within RDBMS". International Journal of Software Innovation 8, n.º 1 (enero de 2020): 82–91. http://dx.doi.org/10.4018/ijsi.2020010105.
Texto completoHuang, Yi, Xin Qiang Ma, Dan Ning Li y Rong Wu. "Research and Applications of Access Control Based on Logic SQL Database System". Advanced Materials Research 143-144 (octubre de 2010): 672–76. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.672.
Texto completoXiong, An Ping y Xin Xin He. "Multiple Access Control Struction for Cloud with Ciphertext". Applied Mechanics and Materials 556-562 (mayo de 2014): 5888–92. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5888.
Texto completoZhong, Ting, You Peng Sun y Qiao Liu. "Fine-Grained Access Control with Efficient Revocation in Cloud Storage". Applied Mechanics and Materials 571-572 (junio de 2014): 79–89. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.79.
Texto completoTruong, Hien, José L. Hernández-Ramos, Juan A. Martinez, Jorge Bernal Bernabe, Wenting Li, Agustin Marin Frutos y Antonio Skarmeta. "Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts". Security and Communication Networks 2022 (2 de junio de 2022): 1–14. http://dx.doi.org/10.1155/2022/1828747.
Texto completoPereira, Óscar Mortágua, Diogo Domingues Regateiro y Rui L. Aguiar. "Secure, Dynamic and Distributed Access Control Stack for Database Applications". International Journal of Software Engineering and Knowledge Engineering 25, n.º 09n10 (noviembre de 2015): 1703–8. http://dx.doi.org/10.1142/s0218194015710035.
Texto completoKaushik, Shweta y Charu Gandhi. "Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud". International Journal of Information Security and Privacy 15, n.º 2 (abril de 2021): 29–52. http://dx.doi.org/10.4018/ijisp.2021040102.
Texto completoShen, Xieyang, Chuanhe Huang, Danxin Wang y Jiaoli Shi. "A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart Cities". Wireless Communications and Mobile Computing 2021 (8 de octubre de 2021): 1–15. http://dx.doi.org/10.1155/2021/6686675.
Texto completoHelil, Nurmamat y Kaysar Rahman. "CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy". Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/2713595.
Texto completoStojanov, Riste, Vladimir Zdraveski y Dimitar Trajanov. "Challenges and Opportunities in Applying Semantics to Improve Access Control in the Field of Internet of Things". Electronics ETF 21, n.º 2 (8 de agosto de 2018): 66. http://dx.doi.org/10.7251/els1721066s.
Texto completoZhang, Duo, Shangping Wang, Yinglong Zhang, Qian Zhang y Yaling Zhang. "A Secure and Privacy-Preserving Medical Data Sharing via Consortium Blockchain". Security and Communication Networks 2022 (18 de mayo de 2022): 1–15. http://dx.doi.org/10.1155/2022/2759787.
Texto completoIbraimi, Luan, Qiang Tang, Pieter Hartel y Willem Jonker. "Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records". International Journal of Computational Models and Algorithms in Medicine 1, n.º 2 (abril de 2010): 1–21. http://dx.doi.org/10.4018/jcmam.2010040101.
Texto completoSzabó, Zoltán y Vilmos Bilicki. "Access Control of EHR Records in a Heterogeneous Cloud Infrastructure". Acta Cybernetica 25, n.º 2 (7 de diciembre de 2021): 485–516. http://dx.doi.org/10.14232/actacyb.290283.
Texto completoКраснов, С. А., А. А. Нечай y О. Н. Бамбурова. "An approach to declining access in information systems based on intellectual data analysis". Vestnik of Russian New University. Series «Complex systems: models, analysis, management», n.º 4 (10 de enero de 2022): 95–105. http://dx.doi.org/10.18137/rnu.v9187.21.04.p.095.
Texto completoNagasubramanian, Gayathri, Rakesh kumar Sakthivel y Fadi Al-Turjman. "Secure and Consistent Job Administration Using Encrypted Data Access Policies in Cloud Systems". Computers & Electrical Engineering 96 (diciembre de 2021): 107520. http://dx.doi.org/10.1016/j.compeleceng.2021.107520.
Texto completoLiu, Xueyan, Yukun Luo y Xiaotao Yang. "Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks". Mobile Information Systems 2020 (3 de agosto de 2020): 1–12. http://dx.doi.org/10.1155/2020/3984048.
Texto completoLiu, Meiping, Cheng Yang, Hao Li y Yana Zhang. "An Efficient Attribute-Based Access Control (ABAC) Policy Retrieval Method Based on Attribute and Value Levels in Multimedia Networks". Sensors 20, n.º 6 (20 de marzo de 2020): 1741. http://dx.doi.org/10.3390/s20061741.
Texto completo