Articoli di riviste sul tema "Access control"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Access control".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Chepuru, Anitha, Dr K. Venugopal Rao e Amardeep Matta. "Server Access Control". International Journal of Scientific Research 1, n. 7 (1 giugno 2012): 78–79. http://dx.doi.org/10.15373/22778179/dec2012/31.
Testo completoAbd-Ali, Jamal. "A Metamodel for Hybrid Access Control Policies". Journal of Software 10, n. 7 (luglio 2015): 784–87. http://dx.doi.org/10.17706//jsw.10.7.784-797.
Testo completoSaunders, G., M. Hitchens e V. Varadharajan. "Role-based access control and the access control matrix". ACM SIGOPS Operating Systems Review 35, n. 4 (ottobre 2001): 6–20. http://dx.doi.org/10.1145/506084.506085.
Testo completoPenelova, Maria. "Access Control Models". Cybernetics and Information Technologies 21, n. 4 (1 dicembre 2021): 77–104. http://dx.doi.org/10.2478/cait-2021-0044.
Testo completoSchuldt, Alison. "PAR access control". Nature Reviews Molecular Cell Biology 12, n. 11 (21 ottobre 2011): 693. http://dx.doi.org/10.1038/nrm3220.
Testo completoSubramanian, Savithri. "Control and access". Contributions to Indian Sociology 42, n. 1 (aprile 2008): 93–122. http://dx.doi.org/10.1177/006996670704200105.
Testo completoFriedman, Michael. "Access-control software". Computers & Security 7, n. 5 (ottobre 1988): 523. http://dx.doi.org/10.1016/0167-4048(88)90293-3.
Testo completoCollinson, Helen. "Workstation access control". Computers & Security 14, n. 2 (gennaio 1995): 121. http://dx.doi.org/10.1016/0167-4048(95)90061-6.
Testo completoZuva, T. "Hybridization of Bimodal Biometrics for Access Control Authentication". International Journal of Future Computer and Communication 3, n. 6 (dicembre 2014): 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.
Testo completoShuriya.b, Shuriya b. "Role based Access Control using Cp-Abe Algorithm". Indian Journal of Applied Research 4, n. 7 (1 ottobre 2011): 171–72. http://dx.doi.org/10.15373/2249555x/july2014/51.
Testo completoKAINZ, Ondrej, Ján DROZD, Miroslav MICHALKO e František JAKAB. "RASPBERRY PI-BASED ACCESS CONTROL USING FACE RECOGNITION". Acta Electrotechnica et Informatica 19, n. 4 (13 gennaio 2020): 15–20. http://dx.doi.org/10.15546/aeei-2019-0025.
Testo completoZhou, Zhenji, Lifa Wu e Zheng Hong. "Context-Aware Access Control Model for Cloud Computing". International Journal of Grid and Distributed Computing 6, n. 6 (31 dicembre 2013): 1–12. http://dx.doi.org/10.14257/ijgdc.2013.6.6.01.
Testo completoIkponmwosa, Oghogho, Otuagoma S., Ufuoma Jeffrey Okieke, Ebimene E. E., Dania B. P., Azubogu D. I., Anamonye U.G. et al. "FACE RECOGNITION SYSTEM FOR AUTOMATIC DOOR ACCESS CONTROL". Engineering and Technology Journal 08, n. 02 (3 febbraio 2023): 1981–85. http://dx.doi.org/10.47191/etj/v8i2.03.
Testo completoYaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures". Information Resources Management Journal 30, n. 4 (ottobre 2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.
Testo completoKarjoth, Günter. "Access control with IBM Tivoli access manager". ACM Transactions on Information and System Security 6, n. 2 (maggio 2003): 232–57. http://dx.doi.org/10.1145/762476.762479.
Testo completoR. Bauer Mengelberg, Juan. "Teaching System Access Control". Issues in Informing Science and Information Technology 2 (2005): 139–58. http://dx.doi.org/10.28945/817.
Testo completoJunquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos e José-Javier Martinez-Herráiz. "Access Control beyond Authentication". Security and Communication Networks 2021 (1 ottobre 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.
Testo completoBaláž, Anton, Branislav Madoš e Michal Ambróz. "Android Access Control Extension". Acta Informatica Pragensia 4, n. 3 (31 dicembre 2015): 310–17. http://dx.doi.org/10.18267/j.aip.77.
Testo completoHamby, Sherry. "Coercion, Access, and Control". Criminal Justice Review 43, n. 1 (13 febbraio 2018): 5–9. http://dx.doi.org/10.1177/0734016817751581.
Testo completoYe, Shuiming, Ying Luo, Jian Zhao e Sen-ChingS Cheung. "Anonymous Biometric Access Control". EURASIP Journal on Information Security 2009, n. 1 (2009): 865259. http://dx.doi.org/10.1186/1687-417x-2009-865259.
Testo completoToledo, Rodolfo, Angel Nunez, Eric Tanter e Jacques Noye. "Aspectizing Java Access Control". IEEE Transactions on Software Engineering 38, n. 1 (gennaio 2012): 101–17. http://dx.doi.org/10.1109/tse.2011.6.
Testo completoToledo, Rodolfo, e Eric Tanter. "Access Control in JavaScript". IEEE Software 28, n. 5 (settembre 2011): 76–84. http://dx.doi.org/10.1109/ms.2010.154.
Testo completoAlhamdani, Wasim A. "Resilent Access Control Model". Journal of Applied Security Research 12, n. 4 (2 ottobre 2017): 478–96. http://dx.doi.org/10.1080/19361610.2017.1354273.
Testo completoBarker, Steve, Marek J. Sergot e Duminda Wijesekera. "Status-Based Access Control". ACM Transactions on Information and System Security 12, n. 1 (ottobre 2008): 1–47. http://dx.doi.org/10.1145/1410234.1410235.
Testo completoStevens, Gunnar, e Volker Wulf. "Computer-supported access control". ACM Transactions on Computer-Human Interaction 16, n. 3 (settembre 2009): 1–26. http://dx.doi.org/10.1145/1592440.1592441.
Testo completoStankovski, Stevan, Gordana Ostojic, Nikola Djukic, Srdjan Tegeltija e Aleksandar Milojkovic. "Bluetooth parking access control". Sensor Review 34, n. 3 (10 giugno 2014): 244–54. http://dx.doi.org/10.1108/sr-06-2012-643.
Testo completoHu, Vincent C., D. Richard Kuhn e David F. Ferraiolo. "Attribute-Based Access Control". Computer 48, n. 2 (febbraio 2015): 85–88. http://dx.doi.org/10.1109/mc.2015.33.
Testo completoMoffett, Jonathan D., e Morris S. Sloman. "Content-dependent access control". ACM SIGOPS Operating Systems Review 25, n. 2 (aprile 1991): 63–70. http://dx.doi.org/10.1145/122120.122125.
Testo completoHu, Vincent C., e Rick Kuhn. "Access Control Policy Verification". Computer 49, n. 12 (dicembre 2016): 80–83. http://dx.doi.org/10.1109/mc.2016.368.
Testo completoNicola, Rocco De, GianLuigi Ferrari, Rosario Pugliese e Betti Venneri. "Types for access control". Theoretical Computer Science 240, n. 1 (giugno 2000): 215–54. http://dx.doi.org/10.1016/s0304-3975(99)00232-7.
Testo completoMurray, Bill. "Security and access control". Computer Fraud & Security Bulletin 1992, n. 12 (dicembre 1992): 10–15. http://dx.doi.org/10.1016/s0142-0496(09)90145-x.
Testo completoParker, T. A. "Network access control developments". Computer Audit Update 1990, n. 6 (gennaio 1990): 3–10. http://dx.doi.org/10.1016/s0960-2593(05)80056-4.
Testo completoJackson, Keith. "Horatius access control system". Computer Fraud & Security Bulletin 11, n. 6 (aprile 1989): 17–19. http://dx.doi.org/10.1016/0142-0496(89)90204-x.
Testo completoGan, Guohua, E. Chen, Zhiyuan Zhou e Yan Zhu. "Token-Based Access Control". IEEE Access 8 (2020): 54189–99. http://dx.doi.org/10.1109/access.2020.2979746.
Testo completoDomingo-Ferrer, Joseph. "Algorithm- sequenced access control". Computers & Security 10, n. 7 (novembre 1991): 639–52. http://dx.doi.org/10.1016/0167-4048(91)90122-t.
Testo completoParker, Tom. "Role based access control". Computers & Security 14, n. 5 (gennaio 1995): 418. http://dx.doi.org/10.1016/0167-4048(95)97115-q.
Testo completoBhatia, Rekha, e Manpreet Singh Gujral. "Privacy Aware Access Control". International Journal of Information Technologies and Systems Approach 10, n. 2 (luglio 2017): 17–30. http://dx.doi.org/10.4018/ijitsa.2017070102.
Testo completoYe, Shuiming, Ying Luo, Jian Zhao e Sen-Ching S. Cheung. "Anonymous Biometric Access Control". EURASIP Journal on Information Security 2009 (2009): 1–17. http://dx.doi.org/10.1155/2009/865259.
Testo completoКОРЧИНСЬКИЙ, ВОЛОДИМИР, ІРИНА ТАРАСЕНКО, СЕРГІЙ РАЦИБОРИНСЬКИЙ, ОЛЕКСАНДР АКАЄВ e АРТЕМ ХАДЖИОГЛО. "AUTOMATED ACCESS CONTROL SYSTEMS". Herald of Khmelnytskyi National University. Technical sciences 331, n. 1 (29 febbraio 2024): 291–96. http://dx.doi.org/10.31891/2307-5732-2024-331-44.
Testo completoDUNDUA, Besik, Khimuri RUKHAIA, Mikheili RUKHAIA e Lali TIBUA. "PρLog for Access Control". Journal of Technical Science and Technologies 5, n. 2 (6 febbraio 2017): 41–44. http://dx.doi.org/10.31578/jtst.v5i2.108.
Testo completoKim, Jinsu, e Namje Park. "Role Based Access Control based File Access Control Mechanism with Smart Contract". Journal of Korean Institute of Information Technology 17, n. 9 (30 settembre 2019): 113–21. http://dx.doi.org/10.14801/jkiit.2019.17.9.113.
Testo completoBertolino, Antonia, Said Daoudagh, Francesca Lonetti, Eda Marchetti e Louis Schilders. "Automated testing of eXtensible Access Control Markup Language‐based access control systems". IET Software 7, n. 4 (agosto 2013): 203–12. http://dx.doi.org/10.1049/iet-sen.2012.0101.
Testo completoLobo, Jorge. "Relationship-based access control: More than a social network access control model". Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 9, n. 2 (6 settembre 2018): e1282. http://dx.doi.org/10.1002/widm.1282.
Testo completoLijun Chen, S. H. Low e J. C. Doyle. "Random Access Game and Medium Access Control Design". IEEE/ACM Transactions on Networking 18, n. 4 (agosto 2010): 1303–16. http://dx.doi.org/10.1109/tnet.2010.2041066.
Testo completoZhu, Nafei, Fangbo Cai, Jingsha He, Yixuan Zhang, Wenxin Li e Zhao Li. "Management of access privileges for dynamic access control". Cluster Computing 22, S4 (24 febbraio 2018): 8899–917. http://dx.doi.org/10.1007/s10586-018-2018-1.
Testo completoLun-wei, Wang, Liao Xiang-ke e Wang Huai-min. "Access request trustworthiness in weighted access control framework". Wuhan University Journal of Natural Sciences 10, n. 1 (gennaio 2005): 65–69. http://dx.doi.org/10.1007/bf02828619.
Testo completoDanilescu, Marcel, e Victor Besliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES". Journal of Engineering Science XXVIII, n. 2 (giugno 2021): 67–78. http://dx.doi.org/10.52326/jes.utm.2021.28(2).05.
Testo completoOsborn, Sylvia, Ravi Sandhu e Qamar Munawer. "Configuring role-based access control to enforce mandatory and discretionary access control policies". ACM Transactions on Information and System Security 3, n. 2 (maggio 2000): 85–106. http://dx.doi.org/10.1145/354876.354878.
Testo completoZhang, Rui, Fausto Giunchiglia, Bruno Crispo e Lingyang Song. "Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment". Wireless Personal Communications 55, n. 1 (5 agosto 2009): 5–17. http://dx.doi.org/10.1007/s11277-009-9782-4.
Testo completoJain, Taniya. "Secure Big Data Access Control Policies for Cloud Computing Environment". International Journal of Innovative Research in Computer Science & Technology 5, n. 2 (31 marzo 2017): 253–56. http://dx.doi.org/10.21276/ijircst.2017.5.2.8.
Testo completo