Littérature scientifique sur le sujet « LI. Authentication, and access control »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « LI. Authentication, and access control ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "LI. Authentication, and access control"
Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos et José-Javier Martinez-Herráiz. « Access Control beyond Authentication ». Security and Communication Networks 2021 (1 octobre 2021) : 1–11. http://dx.doi.org/10.1155/2021/8146553.
Texte intégralSandhu, Ravi, et Pierangela Samarati. « Authentication, access control, and audit ». ACM Computing Surveys 28, no 1 (mars 1996) : 241–43. http://dx.doi.org/10.1145/234313.234412.
Texte intégralLiu, Jing, Yang Xiao et C. L. Philip Chen. « Internet of things' authentication and access control ». International Journal of Security and Networks 7, no 4 (2012) : 228. http://dx.doi.org/10.1504/ijsn.2012.053461.
Texte intégralHarn, L., et H. Y. Lin. « Integration of user authentication and access control ». IEE Proceedings E Computers and Digital Techniques 139, no 2 (1992) : 139. http://dx.doi.org/10.1049/ip-e.1992.0022.
Texte intégralMa, Binhao, Xurui Zheng, Can Zhao, Yibing Wang, Dejun Wang et Bo Meng. « A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain ». PLOS ONE 17, no 9 (23 septembre 2022) : e0274748. http://dx.doi.org/10.1371/journal.pone.0274748.
Texte intégralZuva, T. « Hybridization of Bimodal Biometrics for Access Control Authentication ». International Journal of Future Computer and Communication 3, no 6 (décembre 2014) : 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.
Texte intégralKakarla, Geeta, et S. Phani Kumar. « Blockchain Powered Mutual Authentication and Access Control Protocol ». International Journal of Computer Networks and Applications 9, no 1 (28 février 2022) : 103. http://dx.doi.org/10.22247/ijcna/2022/211629.
Texte intégralSUMI, Kazuhiko. « Biometrics Authentication and Application to Access Control Systems ». Journal of The Institute of Electrical Engineers of Japan 129, no 4 (2009) : 237–40. http://dx.doi.org/10.1541/ieejjournal.129.237.
Texte intégralGalka, Jakub, Mariusz Masior et Michal Salasa. « Voice authentication embedded solution for secured access control ». IEEE Transactions on Consumer Electronics 60, no 4 (novembre 2014) : 653–61. http://dx.doi.org/10.1109/tce.2014.7027339.
Texte intégralKarger, Paul A. « Authentication and discretionary access control in computer networks ». Computers & ; Security 5, no 4 (décembre 1986) : 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.
Texte intégralThèses sur le sujet "LI. Authentication, and access control"
SILVESTRE, BRUNO OLIVEIRA. « INTERINSTITUTIONAL ACCESS : AUTHENTICATION AND ACCESS CONTROL ». PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.
Texte intégralO uso de computação distribuída vem expandindo seu escopo, saindo de aplicações em redes locais para aplicações envolvendo diversas instituições. Em termos de segurança, essa expansão introduz desafios em identificar usuários oriundos das diferentes organizações e definir seus direitos de acesso a determinado recurso. Abordagens comuns adotam a replicação do cadastro dos usuários pelas diversas instituições ou o compartilhamente de uma mesma identidade por um conjunto de usuários. Entretanto, essas estratégias apresentam deficiências, demandando, por exemplo, maior esforço de gerência por parte dos administradores e até esbarrando em políticas de privacidade. Neste trabalho propomos uma arquitetura que utiliza o conceito de papéis para a autenticação e o controle de acesso entre diferentes instituições. Baseado em uma relação de confiança entre as organizações, a arquitetura permite que os usuários sejam autenticados na instituições onde estão afiliados e utiliza o papel por eles desempenhados para controlar o acesso aos recursos disponibilizados pelas demais organizações.
Distributed computing has been expanding its scope from local area network applications to wide-area applications, involving different organizations. This expansion implies in several new security challenges, such as the identification of users originating from different organizations and the definition of their access rights. Commom aproaches involve replicating user data in several institutions or sharing identities among sets of users. However, these approaches have several limitations, sucj as the increased management effort of administrators or problems with privacy policies. This work proposes a framework for inter-institucional authentication. The framework is based on the concepts of RBAC (role-based access control) and of trust between organizations.
Johnson, Henric. « Toward adjustable lightweight authentication for network access control / ». Karlskrona : Blekinge Institute of Technology, 2005. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/30ef501d402539d3c12570f5005184f4?OpenDocument.
Texte intégralBehrad, Shanay. « Slice specific authentication and access control for 5G ». Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS007.
Texte intégralThe fifth generation of mobile cellular networks, 5G, is designed to support a set of new use cases and requirements, e.g. concerning quality of service or security. Using the virtualization technologies and the concept of network slicing, the 5G network operators will be able to provide specific connectivity capabilities in order to support these various use cases. Each network slice can be dedicated to a 3rd party (i.e., any business actor that is not the network operator), and be designed to fit its requirements.However, although network slices can be designed by enabling or disabling certain network functions, the Authentication and Access Control (AAC) mechanisms remain the same for all slices, with tightly coupled network components.This thesis proposes 5G-SSAAC (5G Slice-Specific AAC), as an initial step to introduce a more loosely coupled design into the whole 5G network architecture. 5G-SSAAC enables 5G networks to provide various AAC mechanisms to the 3rd parties according to their security requirements. To assess this innovative mechanism, the thesis analyses the consequences of using the 5G-SSAAC on the security of the whole 5G system. The feasibility of the 5G-SSAAC is also presented with the implementation of a fully virtualized mobile network through an OAI (Open Air Interface) based testbed. This work finally evaluates the impact of 5G-SSAAC mechanism on the network load considering the anticipated number of AAC signalling messages compared to the existing AAC mechanisms in cellular networks
OLSSON, JOAKIM. « Method for gesture based authentication in physical access control ». Thesis, KTH, Maskinkonstruktion (Inst.), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209339.
Texte intégralASSA Abloy is the largest global supplier of intelligent locks and security solutions. The company constantly strives to develop new and innovative solutions for physical access control. One concept the company wanted to investigate aimed to allow the user to effortlessly unlock a door using gestures, resulting in a seamless experience. The idea was to use a wearable as a credential device and identifying the user gestures with the sensors supplied by the wearable. The gesture used in this thesis project were knocks, meaning that the user unlocks the door by knocking on it. The main objective of this thesis project was to develop a system allowing knocks to be used as a method of authentication and evaluate the system based on system security and user convenience. The system developed consists of two accelerometer sensors; one located in the wearable and one located in the lock/door. The signals from each sensor are processed and analyzed to detect knocks. The time correlation between the knocks detected by each sensor are analyzed to verify that they originate from the same user. A theoretical model of the system was developed to facilitate the evaluation of the system. The evaluation of the system showed that both the system security and the user continence attained satisfying values. This thesis shows that the concept has high potential but further work is needed. The framework of methods used to evaluate the system in this thesis can in the same way be used to evaluate systems during any further work.
Burdis, Keith Robert. « Distributed authentication for resource control ». Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006512.
Texte intégralSubils, Jean-Baptiste. « Authentication Via Multiple Associated Devices ». Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5778.
Texte intégralMay, Brian 1975. « Scalable access control ». Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.
Texte intégralYildirim, Merve. « Security and usability in password authentication ». Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/71873/.
Texte intégralShen, Ziyi. « Red Door : Firewall Based Access Control in ROS ». Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752358/.
Texte intégralCeccato, Silvia. « Security in Global Navigation Satellite Systems : authentication, integrity protection and access control ». Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3425426.
Texte intégralLivres sur le sujet "LI. Authentication, and access control"
Boonkrong, Sirapat. Authentication and Access Control. Berkeley, CA : Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.
Texte intégralTricia, Ballad, et Banks Erin K, dir. Access control, authentication, and public key infrastructure. Sudbury, MA : Jones & Bartlett Learning, 2011.
Trouver le texte intégralLibrary public access workstation authentication. Washington, D.C : Association of Research Libraries, Office of Leadership and Management Services, 2003.
Trouver le texte intégral802.1X port-based authentication. Boca Raton : Auerbach, 2007.
Trouver le texte intégralBrown, Edwin Lyle. 802.1X Port-Based Authentication. London : Taylor and Francis, 2006.
Trouver le texte intégralNational Institute of Standards and Technology (U.S.) et RAND Homeland Security and Defense Center, dir. Influences on the adoption of multifactor authentication. Santa Monica : RAND, 2011.
Trouver le texte intégralLibicki, Martin C. Influences on the adoption of multifactor authentication. Santa Monica : RAND, 2011.
Trouver le texte intégralE, Koontz John, Devaney Judith E. 1943-, National Institute of Standards and Technology (U.S.) et United States. Dept. of Energy, dir. An authentication framework for Web access to remote hosts. Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Trouver le texte intégralNational Institute of Standards and Technology (U.S.). Entity authentication using public key cryptography. Gaithersburg, MD : Information Technology Laboratory, National Institute of Standards and Technology, 1997.
Trouver le texte intégralBurnett, Mark. Perfect Passwords : Selection, Protection, Authentication. Massachusetts, USA : Syngress, 2005.
Trouver le texte intégralChapitres de livres sur le sujet "LI. Authentication, and access control"
Boonkrong, Sirapat. « Biometric Authentication ». Dans Authentication and Access Control, 107–32. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_5.
Texte intégralBoonkrong, Sirapat. « Password-Based Authentication ». Dans Authentication and Access Control, 71–105. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_4.
Texte intégralBoonkrong, Sirapat. « Multi-factor Authentication ». Dans Authentication and Access Control, 133–62. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_6.
Texte intégralBasin, David, Patrick Schaller et Michael Schläpfer. « Authentication and Access Control ». Dans Applied Information Security, 47–67. Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_4.
Texte intégralBoonkrong, Sirapat. « Introduction to Cryptography ». Dans Authentication and Access Control, 1–30. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_1.
Texte intégralBoonkrong, Sirapat. « Public Key Infrastructure ». Dans Authentication and Access Control, 31–43. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_2.
Texte intégralBoonkrong, Sirapat. « Methods and Threats of Authentication ». Dans Authentication and Access Control, 45–70. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_3.
Texte intégralBoonkrong, Sirapat. « Authentication and Key Establishment Protocols ». Dans Authentication and Access Control, 163–95. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_7.
Texte intégralBoonkrong, Sirapat. « Current and Future Trends ». Dans Authentication and Access Control, 197–222. Berkeley, CA : Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_8.
Texte intégralKirkpatrick, Michael, et Elisa Bertino. « Context-Dependent Authentication and Access Control ». Dans iNetSec 2009 – Open Research Problems in Network Security, 63–75. Berlin, Heidelberg : Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05437-2_6.
Texte intégralActes de conférences sur le sujet "LI. Authentication, and access control"
Nabeel, Mohamed. « Session details : Access Control and Authentication ». Dans CODASPY '18 : Eighth ACM Conference on Data and Application Security and Privacy. New York, NY, USA : ACM, 2018. http://dx.doi.org/10.1145/3258528.
Texte intégralQi, Lin, et Li Zhi. « Authentication and Access Control in Satellite Network ». Dans 2010 Third International Symposiums on Electronic Commerce and Security (ISECS). IEEE, 2010. http://dx.doi.org/10.1109/isecs.2010.12.
Texte intégralCvrček, Tadeáš, et Petr Dzurenda. « Access Control System Using Multi-factor Authentication ». Dans STUDENT EEICT 2022. Brno : Fakulta elektrotechniky a komunikacnich technologii VUT v Brne, 2022. http://dx.doi.org/10.13164/eeict.2022.190.
Texte intégralFu, Zhi, et John C. Strassner. « Access Control and Authentication for Converged Wireless Networks ». Dans 2006 Third Annual International Conference on Mobile and Ubiquitous Systems : Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340423.
Texte intégralFu, Zhi, et John C. Strassner. « Access Control and Authentication for Converged Wireless Networks ». Dans 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems. IEEE, 2006. http://dx.doi.org/10.1109/mobiqw.2006.361755.
Texte intégralNick, William, Joseph Shelton, Cory Sabol et Albert Esterline. « Federated protocol for biometric authentication and access control ». Dans 2017 Computing Conference. IEEE, 2017. http://dx.doi.org/10.1109/sai.2017.8252195.
Texte intégralde Oliveira, Adriana Esmeraldo, Gustavo Henrique Matos Bezerra Motta et Leonardo Vidal Batista. « A multibiometric access control architecture for continuous authentication ». Dans 2010 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2010. http://dx.doi.org/10.1109/isi.2010.5484746.
Texte intégralBao, Lichun. « Location Authentication Methods for Wireless Network Access Control ». Dans 2008 IEEE International Performance Computing and Communications Conference (IPCCC). IEEE, 2008. http://dx.doi.org/10.1109/pccc.2008.4745118.
Texte intégralXu, Cheng, Jianliang Xu, Haibo Hu et Man Ho Au. « When Query Authentication Meets Fine-Grained Access Control ». Dans SIGMOD/PODS '18 : International Conference on Management of Data. New York, NY, USA : ACM, 2018. http://dx.doi.org/10.1145/3183713.3183741.
Texte intégral« CERTIFICATE-BASED ACCESS CONTROL AND AUTHENTICATION FOR DHCP ». Dans 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001396100990106.
Texte intégralRapports d'organisations sur le sujet "LI. Authentication, and access control"
Narayan, K., et D. Nelson. Using Authentication, Authorization, and Accounting Services to Dynamically Provision View-Based Access Control Model User-to-Group Mappings. Sous la direction de R. Presuhn. RFC Editor, décembre 2010. http://dx.doi.org/10.17487/rfc6065.
Texte intégral