Littérature scientifique sur le sujet « LI. Authentication, and access control »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « LI. Authentication, and access control ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "LI. Authentication, and access control"

1

A.Karunamurthy,, Dr. "LOCATION- BASED SECURITY FOR PREVENTING DATA EXPOSURE IN CORPORATE ENVIRNOMENT." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49363.

Texte intégral
Résumé :
ABSTRACT: In today’s increasingly connected world, secure data sharing and access have become essential for businesses and organizations. With the advent of remote working and mobile access to resources, employees expect seamless access to documents, emails, and collaboration platforms from various devices and locations, often across different networks. However, accessing critical data from untrusted networks presents significant security risks, including potential data loss and unauthorized exposure of sensitive information. To address these challenges, traditional logical security mechanisms
Styles APA, Harvard, Vancouver, ISO, etc.
2

Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.

Texte intégral
Résumé :
Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know
Styles APA, Harvard, Vancouver, ISO, etc.
3

Sandhu, Ravi, and Pierangela Samarati. "Authentication, access control, and audit." ACM Computing Surveys 28, no. 1 (1996): 241–43. http://dx.doi.org/10.1145/234313.234412.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Zyryanova, Svetlana A., Yuliya Yu Vassunova, and Irina V. Chumak. "INNOVATIVE AUTHENTICATION AND ACCESS CONTROL TECHNOLOGIES." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 4/9, no. 145 (2024): 115–21. http://dx.doi.org/10.36871/ek.up.p.r.2024.04.09.018.

Texte intégral
Résumé :
The scientific article explores innovative authentication and access control technologies in the modern information society. The article analyzes the existing authentication and access control methods, as well as examines the latest trends and developments in this area. Special attention is paid to the use of biometric data, machine learning and artificial intelligence to ensure the safety and convenience of users. The article also discusses the advantages, challenges and prospects of using innovative authentication and access control technologies in various fields, including information secur
Styles APA, Harvard, Vancouver, ISO, etc.
5

Ma, Binhao, Xurui Zheng, Can Zhao, Yibing Wang, Dejun Wang, and Bo Meng. "A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain." PLOS ONE 17, no. 9 (2022): e0274748. http://dx.doi.org/10.1371/journal.pone.0274748.

Texte intégral
Résumé :
Self-sovereign identity authentication protocol is an active research topic in the field of identity authentication and management. However, the current SSI authentication protocols pay little attention to privacy protection and the fine-grained access control. Therefore, a secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control is proposed. Firstly, the formal model of SSI including the SDPP-SSI identity model and management model is presented. And then, based on the federated blockchain, the distributed identifier is used as a global ident
Styles APA, Harvard, Vancouver, ISO, etc.
6

S, Krishnarajan, and A. Rengarajan. "Surveying Authentication and Authorization Mechanisms in Today's Web Technology Landscape." International Journal of Innovative Research in Computer and Communication Engineering 12, no. 05 (2024): 6337–40. http://dx.doi.org/10.15680/ijircce.2024.1205198.

Texte intégral
Résumé :
This paper presents a comprehensive survey of authentication and authorization mechanisms in contemporary web technology. It examines the diverse approaches and frameworks employed to secure web systems and protect user data. Beginning with an overview of fundamental concepts such as authentication methods and access control models, the paper explores the landscape of authentication and authorization in depth. It evaluates the effectiveness and limitations of various authentication methods, including passwords, biometrics, and multifactor authentication (MFA). Additionally, the paper scrutiniz
Styles APA, Harvard, Vancouver, ISO, etc.
7

Choubisa, Mukesh, and Brijesh Jajal. "Analysis of Secure Authentication for IoT using Token-based access control." International Journal of Scientific Research in Computer Science and Engineering 13, no. 1 (2025): 21–25. https://doi.org/10.26438/ijsrcse.v13i1.609.

Texte intégral
Résumé :
Currently, the need for more reliable and accessible security systems has increased due to the mounting number of IoT devices. Secure security systems have required many more authentication mechanisms. In multiple authentication mechanisms, a Token-based attribute is much better as compared to another mechanism. Token-Based Attribute Access Control (TB-AAC) is a secure authentication system that associates token-based authentication and attribute-based access control to increase secure security, efficiency, and flexibility. In this paper, we present the design and implementation of the TB-AAC
Styles APA, Harvard, Vancouver, ISO, etc.
8

Liu, Jing, Yang Xiao, and C. L. Philip Chen. "Internet of things' authentication and access control." International Journal of Security and Networks 7, no. 4 (2012): 228. http://dx.doi.org/10.1504/ijsn.2012.053461.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Harn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kang, Jeong Hwa, and Minhye Seo. "Enhanced Authentication for Decentralized IoT Access Control Architecture." Cryptography 7, no. 3 (2023): 42. http://dx.doi.org/10.3390/cryptography7030042.

Texte intégral
Résumé :
The internet of things (IoT) enables a hyperconnected society, offering intelligent services and convenience through various connections between people, objects, and services. However, the current state of the IoT still faces limitations in security. Security issues in the IoT are of significant concern, leading to the proposal of numerous security frameworks and solutions to address these challenges. Authentication and authorization are crucial security requirements in the IoT environment, considering the potential risks posed by inadequate authentication and incorrect authorization. To compr
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Thèses sur le sujet "LI. Authentication, and access control"

1

SILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.

Texte intégral
Résumé :
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR<br>O uso de computação distribuída vem expandindo seu escopo, saindo de aplicações em redes locais para aplicações envolvendo diversas instituições. Em termos de segurança, essa expansão introduz desafios em identificar usuários oriundos das diferentes organizações e definir seus direitos de acesso a determinado recurso. Abordagens comuns adotam a replicação do cadastro dos usuários pelas diversas instituições ou o compartilhamente de uma mesma identidade por um conjunto de usuários. Entretanto, essas estratégias apresentam
Styles APA, Harvard, Vancouver, ISO, etc.
2

Johnson, Henric. "Toward adjustable lightweight authentication for network access control /." Karlskrona : Blekinge Institute of Technology, 2005. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/30ef501d402539d3c12570f5005184f4?OpenDocument.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Behrad, Shanay. "Slice specific authentication and access control for 5G." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS007.

Texte intégral
Résumé :
La cinquième génération de réseaux cellulaires mobiles, 5G, est conçue pour prendre en charge un ensemble de nouveaux cas d'utilisation et exigences, par exemple concernant la qualité de service ou la sécurité. En utilisant les technologies de virtualisation et le concept de découpage de réseau, les opérateurs de réseau 5G seront en mesure de fournir des capacités de connectivité spécifiques afin de prendre en charge ces différents cas d'utilisation. Chaque tranche de réseau (network slice) peut être dédiée à un tiers (c'est-à-dire tout acteur commercial qui n'est pas l'opérateur de réseau) et
Styles APA, Harvard, Vancouver, ISO, etc.
4

OLSSON, JOAKIM. "Method for gesture based authentication in physical access control." Thesis, KTH, Maskinkonstruktion (Inst.), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209339.

Texte intégral
Résumé :
ASSA Abloy är den största globala leverantören av intelligenta lås och säkerhetslösningar. Företaget strävar ständigt efter att utveckla nya och innovativa lösningar för fysisk passerkontroll. Ett koncept som företaget ville undersöka riktade sig mot att göra det möjligt för användaren att enkelt låsa upp en dörr med hjälp av gester, vilket resulterar i en användarvänlig upplevelse. Tanken var att använda en wearable som en credential-enhet och identifiera användarens gester med sensorerna som tillhandahålls av denna. Gesten som används i denna avhandling var knackar, vilket innebär att använd
Styles APA, Harvard, Vancouver, ISO, etc.
5

Burdis, Keith Robert. "Distributed authentication for resource control." Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006512.

Texte intégral
Résumé :
This thesis examines distributed authentication in the process of controlling computing resources. We investigate user sign-on and two of the main authentication technologies that can be used to control a resource through authentication and providing additional security services. The problems with the existing sign-on scenario are that users have too much credential information to manage and are prompted for this information too often. Single Sign-On (SSO) is a viable solution to this problem if physical procedures are introduced to minimise the risks associated with its use. The Generic Secur
Styles APA, Harvard, Vancouver, ISO, etc.
6

Subils, Jean-Baptiste. "Authentication Via Multiple Associated Devices." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5778.

Texte intégral
Résumé :
This thesis presents a practical method of authentication utilizing multiple devices. The factors contributing to the practicality of the method are: the utilization of devices already commonly possessed by users and the amenability to being implemented on a wide variety of devices. The term “device” refers to anything able to perform cryptographic operations, store data, and communicate with another such device. In the method presented herein, multiple devices need to be associated with a single user to provide this user an identity in the system. A public key infrastructure is used to provid
Styles APA, Harvard, Vancouver, ISO, etc.
7

May, Brian 1975. "Scalable access control." Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Yildirim, Merve. "Security and usability in password authentication." Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/71873/.

Texte intégral
Résumé :
This thesis investigates the human-factor problems in password authentication and proposes some usable solutions to these problems by focusing on both forms of knowledge based authentication: textual passwords and graphical passwords. It includes a range of empirical studies to examine users' password-related behaviour and practices in authentication, and helps users to adopt secure password behaviour. This thesis consists of two parts. The first part focuses on traditional text-based passwords. Design flaws and usability issues of existing text-password mechanisms used by many organisations c
Styles APA, Harvard, Vancouver, ISO, etc.
9

Shen, Ziyi. "Red Door: Firewall Based Access Control in ROS." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752358/.

Texte intégral
Résumé :
ROS is a set of computer operating system framework designed for robot software development, and Red Door, a lightweight software firewall that serves the ROS, is intended to strengthen its security. ROS has many flaws in security, such as clear text transmission of data, no authentication mechanism, etc. Red Door can achieve identity verification and access control policy with a small performance loss, all without modifying the ROS source code, to ensure the availability and authentication of ROS applications to the greatest extent.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Ceccato, Silvia. "Security in Global Navigation Satellite Systems: authentication, integrity protection and access control." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3425426.

Texte intégral
Résumé :
In the last decades the use of Global Navigation Satellite System (GNSS) positioning has spread through numerous commercial applications and permeated our daily life. Matching this growing interest for precise positioning worldwide, new systems have been designed and deployed, such as Galileo, the European GNSS. As these systems are relied upon in an ever growing number of safety critical applications, it is vital to devise protections and countermeasures against any threats that may target GNSS modules to harm underlying service. The potential economical advantage that derives from disruptin
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Livres sur le sujet "LI. Authentication, and access control"

1

Boonkrong, Sirapat. Authentication and Access Control. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Tricia, Ballad, and Banks Erin K, eds. Access control, authentication, and public key infrastructure. Jones & Bartlett Learning, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Brown, Edwin Lyle. 802.1X Port-Based Authentication. Taylor and Francis, 2006.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Libicki, Martin C. Influences on the adoption of multifactor authentication. RAND, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

E, Koontz John, Devaney Judith E. 1943-, National Institute of Standards and Technology (U.S.), and United States. Dept. of Energy, eds. An authentication framework for Web access to remote hosts. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

National Institute of Standards and Technology (U.S.). Entity authentication using public key cryptography. Information Technology Laboratory, National Institute of Standards and Technology, 1997.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Burnett, Mark. Perfect Passwords: Selection, Protection, Authentication. Syngress, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

), National Institute of Standards and Technology (U S. Guideline for the use of advanced authentication technology alternatives. Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1994.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Todorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Auerbach Pub, 2007.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

National Computer Security Center (U.S.), ed. A Guide to understanding identification and authentication in trusted systems. National Computer Security Center, 1991.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources

Chapitres de livres sur le sujet "LI. Authentication, and access control"

1

Boonkrong, Sirapat. "Biometric Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Boonkrong, Sirapat. "Password-Based Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Boonkrong, Sirapat. "Multi-factor Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Basin, David, Patrick Schaller, and Michael Schläpfer. "Authentication and Access Control." In Applied Information Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Boonkrong, Sirapat. "Introduction to Cryptography." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Boonkrong, Sirapat. "Public Key Infrastructure." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Boonkrong, Sirapat. "Methods and Threats of Authentication." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Boonkrong, Sirapat. "Authentication and Key Establishment Protocols." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Boonkrong, Sirapat. "Current and Future Trends." In Authentication and Access Control. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kirkpatrick, Michael, and Elisa Bertino. "Context-Dependent Authentication and Access Control." In iNetSec 2009 – Open Research Problems in Network Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05437-2_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "LI. Authentication, and access control"

1

S, Kanagamalliga, Rajalingam S, Karthikeyan M, and Kannan A. "Arduino-Powered Fingerprint Authentication for Door Access Control." In 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2024. http://dx.doi.org/10.1109/icesc60852.2024.10689965.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Martinez, Andrea, Cem Topcuoglu, Abbas Acar, Selcuk Uluagac, and Engin Kirda. "Diversity Perspectives on Access Control and Authentication in Shared IoT Devices." In 2025 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2025. https://doi.org/10.1109/icce63647.2025.10929960.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Krishna, R. Satya, and V. Murali Mohan. "A Novel User Authentication and Access Control Model in Enhancing Cloud Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724423.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Bappy, Faisal Haque, Joon S. Park, Kamrul Hasan, and Tariqul Islam. "ChainGuard: A Blockchain-Based Authentication and Access Control Scheme for Distributed Networks." In 2025 IEEE 22nd Consumer Communications & Networking Conference (CCNC). IEEE, 2025. https://doi.org/10.1109/ccnc54725.2025.10976009.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Nabeel, Mohamed. "Session details: Access Control and Authentication." In CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy. ACM, 2018. http://dx.doi.org/10.1145/3258528.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Qi, Lin, and Li Zhi. "Authentication and Access Control in Satellite Network." In 2010 Third International Symposiums on Electronic Commerce and Security (ISECS). IEEE, 2010. http://dx.doi.org/10.1109/isecs.2010.12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Cvrček, Tadeáš, and Petr Dzurenda. "Access Control System Using Multi-factor Authentication." In STUDENT EEICT 2022. Fakulta elektrotechniky a komunikacnich technologii VUT v Brne, 2022. http://dx.doi.org/10.13164/eeict.2022.190.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Fu, Zhi, and John C. Strassner. "Access Control and Authentication for Converged Wireless Networks." In 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340423.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Fu, Zhi, and John C. Strassner. "Access Control and Authentication for Converged Wireless Networks." In 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems. IEEE, 2006. http://dx.doi.org/10.1109/mobiqw.2006.361755.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Nick, William, Joseph Shelton, Cory Sabol, and Albert Esterline. "Federated protocol for biometric authentication and access control." In 2017 Computing Conference. IEEE, 2017. http://dx.doi.org/10.1109/sai.2017.8252195.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "LI. Authentication, and access control"

1

Narayan, K., and D. Nelson. Using Authentication, Authorization, and Accounting Services to Dynamically Provision View-Based Access Control Model User-to-Group Mappings. Edited by R. Presuhn. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc6065.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!