Artykuły w czasopismach na temat „Data access control policies”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Data access control policies”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Jain, Taniya. "Secure Big Data Access Control Policies for Cloud Computing Environment". International Journal of Innovative Research in Computer Science & Technology 5, nr 2 (31.03.2017): 253–56. http://dx.doi.org/10.21276/ijircst.2017.5.2.8.
Pełny tekst źródłaBouganim, Luc, Francois Dang Ngoc i Philippe Pucheral. "Dynamic access-control policies on XML encrypted data". ACM Transactions on Information and System Security 10, nr 4 (styczeń 2008): 1–37. http://dx.doi.org/10.1145/1284680.1284684.
Pełny tekst źródłaBrewster, Christopher, Barry Nouwt, Stephan Raaijmakers i Jack Verhoosel. "Ontology-based Access Control for FAIR Data". Data Intelligence 2, nr 1-2 (styczeń 2020): 66–77. http://dx.doi.org/10.1162/dint_a_00029.
Pełny tekst źródłaAziz, Benjamin. "Towards open data-driven evaluation of access control policies". Computer Standards & Interfaces 56 (luty 2018): 13–26. http://dx.doi.org/10.1016/j.csi.2017.09.001.
Pełny tekst źródłaYaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures". Information Resources Management Journal 30, nr 4 (październik 2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.
Pełny tekst źródłaPervez, Zeeshan, Asad Masood Khattak, Sungyoung Lee, Young-Koo Lee i Eui-Nam Huh. "Oblivious access control policies for cloud based data sharing systems". Computing 94, nr 12 (21.08.2012): 915–38. http://dx.doi.org/10.1007/s00607-012-0206-z.
Pełny tekst źródłaVenkatesan, G., i K. Ambika. "Indexing Policies in Cloud Information Accountability for Data Sharing". Asian Journal of Computer Science and Technology 2, nr 1 (5.05.2013): 22–27. http://dx.doi.org/10.51983/ajcst-2013.2.1.1712.
Pełny tekst źródłaLiu, Gang, Guofang Zhang, Quan Wang, Shaomin Ji i Lizhi Zhang. "Fine-grained access control method for private data in android system". International Journal of Distributed Sensor Networks 15, nr 3 (marzec 2019): 155014771984023. http://dx.doi.org/10.1177/1550147719840232.
Pełny tekst źródłaSabitha, S., i M. S. Rajasree. "Access control based privacy preserving secure data sharing with hidden access policies in cloud". Journal of Systems Architecture 75 (kwiecień 2017): 50–58. http://dx.doi.org/10.1016/j.sysarc.2017.03.002.
Pełny tekst źródłaGuo, Jinyi, Wei Ren, Yi Ren i Tianqin Zhu. "A Watermark-Based in-Situ Access Control Model for Image Big Data". Future Internet 10, nr 8 (29.07.2018): 69. http://dx.doi.org/10.3390/fi10080069.
Pełny tekst źródłaArunajyothi, G. "Key based Access Control Policies to Solve Security in Cloud Data Sharing". International Journal of Emerging Research in Management and Technology 6, nr 12 (11.06.2018): 45. http://dx.doi.org/10.23956/ijermt.v6i12.33.
Pełny tekst źródłaMuppavarapu, Vineela, i Soon M. Chung. "Semantic-Based Access Control for Data Resources in Open Grid Services Architecture". International Journal of Grid and High Performance Computing 6, nr 2 (kwiecień 2014): 1–23. http://dx.doi.org/10.4018/ijghpc.2014040101.
Pełny tekst źródłaMeneka, M., i K. Meenakshisundaram. "An Enhancement Role and Attribute Based Access Control Mechanism in Big Data". International Journal of Electrical and Computer Engineering (IJECE) 8, nr 5 (1.10.2018): 3187. http://dx.doi.org/10.11591/ijece.v8i5.pp3187-3193.
Pełny tekst źródłaLakaraju, Sandeep, Dianxiang Xu i Yong Wang. "Analysis of Healthcare Workflows in Accordance with Access Control Policies". International Journal of Healthcare Information Systems and Informatics 11, nr 1 (styczeń 2016): 1–20. http://dx.doi.org/10.4018/ijhisi.2016010101.
Pełny tekst źródłaKuts, D. V., i S. V. Porshnev. "THE FEATURES OF MANDATORY ACCESS CONTROL MODEL IN MODERN UNAUTHORIZED ACCESS DATA PROTECTION TOOLS". Journal of the Ural Federal District. Information security 20, nr 3 (2020): 27–33. http://dx.doi.org/10.14529/secur200303.
Pełny tekst źródłaLi, Jian, i William K. Cheung. "Access Control on Semantic Web Data Using Query Rewriting". International Journal of Organizational and Collective Intelligence 1, nr 2 (kwiecień 2010): 46–66. http://dx.doi.org/10.4018/joci.2010040103.
Pełny tekst źródłaShirsath, Rakesh, i Dr K. V. Daya Sagar. "A Review of fine grained access control techniques". International Journal of Engineering & Technology 7, nr 2.7 (18.03.2018): 20. http://dx.doi.org/10.14419/ijet.v7i2.7.10249.
Pełny tekst źródłaHuang, Jie, i Dehua Wu. "Access Control Model Scheme based on Policy Grading in Natural Language Processing Blockchain Environment". Mobile Information Systems 2022 (8.08.2022): 1–9. http://dx.doi.org/10.1155/2022/4365944.
Pełny tekst źródłaTrojer, Thomas, Basel Katt, Ruth Breu, Thomas Schabetsberger i Richard Mair. "Managing Privacy and Effectiveness of Patient-Administered Authorization Policies". International Journal of Computational Models and Algorithms in Medicine 3, nr 2 (kwiecień 2012): 43–62. http://dx.doi.org/10.4018/jcmam.2012040103.
Pełny tekst źródłaSeifermann, Stephan, Robert Heinrich, Dominik Werle i Ralf Reussner. "Detecting violations of access control and information flow policies in data flow diagrams". Journal of Systems and Software 184 (luty 2022): 111138. http://dx.doi.org/10.1016/j.jss.2021.111138.
Pełny tekst źródłaTang, Xiao Yong, Jin Wei Li i Gui Ping Liao. "A Trust-Aware Access Control Policy for Cloud Data Protection". Applied Mechanics and Materials 411-414 (wrzesień 2013): 40–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.40.
Pełny tekst źródłaZhang, Jian, Jin Yao i Kun Huang. "Research on Access Control Policy for Confidential Information System". Applied Mechanics and Materials 263-266 (grudzień 2012): 3064–67. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3064.
Pełny tekst źródłaLi, Teng, Jiawei Zhang, Yanbo Yang, Wei Qiao i Yangxu Lin. "Auditable and Times limitable Secure Data Access Control for Cloud-based Industrial Internet of Things". Journal of Networking and Network Applications 1, nr 3 (2021): 129–38. http://dx.doi.org/10.33969/j-nana.2021.010306.
Pełny tekst źródłaZheng, Kaifa, Caiyang Ding i Jinchen Wang. "A Secure Data-Sharing Scheme for Privacy-Preserving Supporting Node–Edge–Cloud Collaborative Computation". Electronics 12, nr 12 (19.06.2023): 2737. http://dx.doi.org/10.3390/electronics12122737.
Pełny tekst źródłaAlattab, Ahmed Abdu, Reyazur Rashid Irshad, Anwar Ali Yahya i Amin A. Al-Awady. "Privacy Protected Preservation of Electric Vehicles’ Data in Cloud Computing Using Secure Data Access Control". Energies 15, nr 21 (31.10.2022): 8085. http://dx.doi.org/10.3390/en15218085.
Pełny tekst źródłaEmad F. Khalaf, Emad F. Khalaf. "A Survey of Access Control and Data Encryption for Database Security". journal of King Abdulaziz University Engineering Sciences 28, nr 1 (4.01.2017): 19–30. http://dx.doi.org/10.4197/eng.28-1.2.
Pełny tekst źródłaIyer, Padmavathi, i Amirreza Masoumzadeh. "Learning Relationship-Based Access Control Policies from Black-Box Systems". ACM Transactions on Privacy and Security 25, nr 3 (31.08.2022): 1–36. http://dx.doi.org/10.1145/3517121.
Pełny tekst źródłaDemurjian, Steven A., Eugene Sanzi, Thomas P. Agresta i William A. Yasnoff. "Multi-Level Security in Healthcare Using a Lattice-Based Access Control Model". International Journal of Privacy and Health Information Management 7, nr 1 (styczeń 2019): 80–102. http://dx.doi.org/10.4018/ijphim.2019010105.
Pełny tekst źródłaLI, Xinlong. "A Blockchain-Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage". Computational Intelligence and Neuroscience 2022 (27.04.2022): 1–12. http://dx.doi.org/10.1155/2022/2254411.
Pełny tekst źródłaTalha, Mohamed, i Anas Abou El Kalam. "Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms". JUCS - Journal of Universal Computer Science 27, nr 12 (28.12.2021): 1300–1324. http://dx.doi.org/10.3897/jucs.77046.
Pełny tekst źródłaKomal, Unnati. "Data Leakage Detection using Cloud Computing". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 3129–32. http://dx.doi.org/10.22214/ijraset.2023.52273.
Pełny tekst źródłaDai, Chang Ying, Wen Tao Gong i Jing Liu. "Access Process of Data-Flow in Cross-Domain Usage Control Model Based on XACML". Advanced Materials Research 143-144 (październik 2010): 1275–79. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1275.
Pełny tekst źródłaHaguouche, Samira, i Zahi Jarir. "Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism". Security and Communication Networks 2018 (21.10.2018): 1–13. http://dx.doi.org/10.1155/2018/1572812.
Pełny tekst źródłaPatil, Suraj Krishna, Sandipkumar Chandrakant Sagare i Alankar Shantaram Shelar. "Use of Purpose and Role Based Access Control Mechanisms to Protect Data Within RDBMS". International Journal of Software Innovation 8, nr 1 (styczeń 2020): 82–91. http://dx.doi.org/10.4018/ijsi.2020010105.
Pełny tekst źródłaHuang, Yi, Xin Qiang Ma, Dan Ning Li i Rong Wu. "Research and Applications of Access Control Based on Logic SQL Database System". Advanced Materials Research 143-144 (październik 2010): 672–76. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.672.
Pełny tekst źródłaXiong, An Ping, i Xin Xin He. "Multiple Access Control Struction for Cloud with Ciphertext". Applied Mechanics and Materials 556-562 (maj 2014): 5888–92. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5888.
Pełny tekst źródłaZhong, Ting, You Peng Sun i Qiao Liu. "Fine-Grained Access Control with Efficient Revocation in Cloud Storage". Applied Mechanics and Materials 571-572 (czerwiec 2014): 79–89. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.79.
Pełny tekst źródłaTruong, Hien, José L. Hernández-Ramos, Juan A. Martinez, Jorge Bernal Bernabe, Wenting Li, Agustin Marin Frutos i Antonio Skarmeta. "Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts". Security and Communication Networks 2022 (2.06.2022): 1–14. http://dx.doi.org/10.1155/2022/1828747.
Pełny tekst źródłaPereira, Óscar Mortágua, Diogo Domingues Regateiro i Rui L. Aguiar. "Secure, Dynamic and Distributed Access Control Stack for Database Applications". International Journal of Software Engineering and Knowledge Engineering 25, nr 09n10 (listopad 2015): 1703–8. http://dx.doi.org/10.1142/s0218194015710035.
Pełny tekst źródłaKaushik, Shweta, i Charu Gandhi. "Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud". International Journal of Information Security and Privacy 15, nr 2 (kwiecień 2021): 29–52. http://dx.doi.org/10.4018/ijisp.2021040102.
Pełny tekst źródłaShen, Xieyang, Chuanhe Huang, Danxin Wang i Jiaoli Shi. "A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart Cities". Wireless Communications and Mobile Computing 2021 (8.10.2021): 1–15. http://dx.doi.org/10.1155/2021/6686675.
Pełny tekst źródłaHelil, Nurmamat, i Kaysar Rahman. "CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy". Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/2713595.
Pełny tekst źródłaStojanov, Riste, Vladimir Zdraveski i Dimitar Trajanov. "Challenges and Opportunities in Applying Semantics to Improve Access Control in the Field of Internet of Things". Electronics ETF 21, nr 2 (8.08.2018): 66. http://dx.doi.org/10.7251/els1721066s.
Pełny tekst źródłaZhang, Duo, Shangping Wang, Yinglong Zhang, Qian Zhang i Yaling Zhang. "A Secure and Privacy-Preserving Medical Data Sharing via Consortium Blockchain". Security and Communication Networks 2022 (18.05.2022): 1–15. http://dx.doi.org/10.1155/2022/2759787.
Pełny tekst źródłaIbraimi, Luan, Qiang Tang, Pieter Hartel i Willem Jonker. "Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records". International Journal of Computational Models and Algorithms in Medicine 1, nr 2 (kwiecień 2010): 1–21. http://dx.doi.org/10.4018/jcmam.2010040101.
Pełny tekst źródłaSzabó, Zoltán, i Vilmos Bilicki. "Access Control of EHR Records in a Heterogeneous Cloud Infrastructure". Acta Cybernetica 25, nr 2 (7.12.2021): 485–516. http://dx.doi.org/10.14232/actacyb.290283.
Pełny tekst źródłaКраснов, С. А., А. А. Нечай i О. Н. Бамбурова. "An approach to declining access in information systems based on intellectual data analysis". Vestnik of Russian New University. Series «Complex systems: models, analysis, management», nr 4 (10.01.2022): 95–105. http://dx.doi.org/10.18137/rnu.v9187.21.04.p.095.
Pełny tekst źródłaNagasubramanian, Gayathri, Rakesh kumar Sakthivel i Fadi Al-Turjman. "Secure and Consistent Job Administration Using Encrypted Data Access Policies in Cloud Systems". Computers & Electrical Engineering 96 (grudzień 2021): 107520. http://dx.doi.org/10.1016/j.compeleceng.2021.107520.
Pełny tekst źródłaLiu, Xueyan, Yukun Luo i Xiaotao Yang. "Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks". Mobile Information Systems 2020 (3.08.2020): 1–12. http://dx.doi.org/10.1155/2020/3984048.
Pełny tekst źródłaLiu, Meiping, Cheng Yang, Hao Li i Yana Zhang. "An Efficient Attribute-Based Access Control (ABAC) Policy Retrieval Method Based on Attribute and Value Levels in Multimedia Networks". Sensors 20, nr 6 (20.03.2020): 1741. http://dx.doi.org/10.3390/s20061741.
Pełny tekst źródła