Siga este link para ver outros tipos de publicações sobre o tema: Access control.

Artigos de revistas sobre o tema "Access control"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Access control".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Chepuru, Anitha, Dr K. Venugopal Rao e Amardeep Matta. "Server Access Control". International Journal of Scientific Research 1, n.º 7 (1 de junho de 2012): 78–79. http://dx.doi.org/10.15373/22778179/dec2012/31.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Abd-Ali, Jamal. "A Metamodel for Hybrid Access Control Policies". Journal of Software 10, n.º 7 (julho de 2015): 784–87. http://dx.doi.org/10.17706//jsw.10.7.784-797.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Saunders, G., M. Hitchens e V. Varadharajan. "Role-based access control and the access control matrix". ACM SIGOPS Operating Systems Review 35, n.º 4 (outubro de 2001): 6–20. http://dx.doi.org/10.1145/506084.506085.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Penelova, Maria. "Access Control Models". Cybernetics and Information Technologies 21, n.º 4 (1 de dezembro de 2021): 77–104. http://dx.doi.org/10.2478/cait-2021-0044.

Texto completo da fonte
Resumo:
Abstract Access control is a part of the security of information technologies. Access control regulates the access requests to system resources. The access control logic is formalized in models. Many access control models exist. They vary in their design, components, policies and areas of application. With the developing of information technologies, more complex access control models have been created. This paper is concerned with overview and analysis for a number of access control models. First, an overview of access control models is presented. Second, they are analyzed and compared by a number of parameters: storing the identity of the user, delegation of trust, fine-grained policies, flexibility, object-versioning, scalability, using time in policies, structure, trustworthiness, workflow control, areas of application etc. Some of these parameters describe the access control models, while other parameters are important characteristics and components of these models. The results of the comparative analysis are presented in tables. Prospects of development of new models are specified.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Schuldt, Alison. "PAR access control". Nature Reviews Molecular Cell Biology 12, n.º 11 (21 de outubro de 2011): 693. http://dx.doi.org/10.1038/nrm3220.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Subramanian, Savithri. "Control and access". Contributions to Indian Sociology 42, n.º 1 (abril de 2008): 93–122. http://dx.doi.org/10.1177/006996670704200105.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Friedman, Michael. "Access-control software". Computers & Security 7, n.º 5 (outubro de 1988): 523. http://dx.doi.org/10.1016/0167-4048(88)90293-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Collinson, Helen. "Workstation access control". Computers & Security 14, n.º 2 (janeiro de 1995): 121. http://dx.doi.org/10.1016/0167-4048(95)90061-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Zuva, T. "Hybridization of Bimodal Biometrics for Access Control Authentication". International Journal of Future Computer and Communication 3, n.º 6 (dezembro de 2014): 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Shuriya.b, Shuriya b. "Role based Access Control using Cp-Abe Algorithm". Indian Journal of Applied Research 4, n.º 7 (1 de outubro de 2011): 171–72. http://dx.doi.org/10.15373/2249555x/july2014/51.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

KAINZ, Ondrej, Ján DROZD, Miroslav MICHALKO e František JAKAB. "RASPBERRY PI-BASED ACCESS CONTROL USING FACE RECOGNITION". Acta Electrotechnica et Informatica 19, n.º 4 (13 de janeiro de 2020): 15–20. http://dx.doi.org/10.15546/aeei-2019-0025.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Zhou, Zhenji, Lifa Wu e Zheng Hong. "Context-Aware Access Control Model for Cloud Computing". International Journal of Grid and Distributed Computing 6, n.º 6 (31 de dezembro de 2013): 1–12. http://dx.doi.org/10.14257/ijgdc.2013.6.6.01.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Ikponmwosa, Oghogho, Otuagoma S., Ufuoma Jeffrey Okieke, Ebimene E. E., Dania B. P., Azubogu D. I., Anamonye U.G. et al. "FACE RECOGNITION SYSTEM FOR AUTOMATIC DOOR ACCESS CONTROL". Engineering and Technology Journal 08, n.º 02 (3 de fevereiro de 2023): 1981–85. http://dx.doi.org/10.47191/etj/v8i2.03.

Texto completo da fonte
Resumo:
A face recognition system for automatic door access control has been developed in this work with a view to providing a relatively more robust and foolproof access control which can provide better security and reduce human errors inherent in other conventional methods. The system was designed with machine learning and artificial intelligence to capture faces, train faces with machine mode, and run trained faces to grant access to the user. The system uses the RaspberryPi module, camera module, servo motor and the GSM module which were all incorporated into the fabricated building to make up the prototype developed to provide access control by means of facial biometrics. In order to grant access to registered users, various photos of the users were taken in different positions and expressions with proper illumination. The user’s face is been captured by the camera module and saved in the database with the help of Raspberry Pi Module. Good lighting condition and other favorable conditions helps the camera module to recognize faces and sends signal to the Raspberry Pi which processes these images and opens the door with the help of the servo motor. The developed prototype was used to train fifty (50) users. It granted access to all fifty (50) users when there was proper illumination and pose but five (5) and nine (9) users respectively were denied access due to challenges of poor illumination and pose variation.
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Yaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures". Information Resources Management Journal 30, n.º 4 (outubro de 2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.

Texto completo da fonte
Resumo:
Almost all computing systems and applications in organizations include some form of access control mechanisms. Managing secure access to computing resources is an important but a challenging task, requiring both administrative and technical measures. This study examines the influence of administrative access control measures on technical access control mechanisms. Based on the four access control clauses defined by ISO/IEC27002, this study develops a model to empirically test the impact of access control policies on systems and applications control activities. The study employs Partial Least Square Structural Equation Modelling (PLS-SEM) to analyze data collected from 223 samples through a survey questionnaire. The results show that the greatest significant impact on applications and systems access control measures is through access control policies mediated by users' responsibilities and accountability and user access management activities. But the direct impact of access control policies on applications and systems access control measures is not significant.
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Karjoth, Günter. "Access control with IBM Tivoli access manager". ACM Transactions on Information and System Security 6, n.º 2 (maio de 2003): 232–57. http://dx.doi.org/10.1145/762476.762479.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

R. Bauer Mengelberg, Juan. "Teaching System Access Control". Issues in Informing Science and Information Technology 2 (2005): 139–58. http://dx.doi.org/10.28945/817.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos e José-Javier Martinez-Herráiz. "Access Control beyond Authentication". Security and Communication Networks 2021 (1 de outubro de 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.

Texto completo da fonte
Resumo:
Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know the secret credentials) or the identity has been impersonated by someone else after the authentication’s process was completed. Continuous authentication does not require the active participation of the user. Aiming to identify the different technologies involved in continuous authentication’s implementations, evaluation methods, and its use cases, this paper presents a systematic review that synthesizes the state of the art. This review is conducted to get a picture about which data sources could allow continuous authentication, in which systems it has been successfully implemented, and which are the most adequate ways to process the data. This review also identifies the defining dimensions of continuous authentication systems.
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Baláž, Anton, Branislav Madoš e Michal Ambróz. "Android Access Control Extension". Acta Informatica Pragensia 4, n.º 3 (31 de dezembro de 2015): 310–17. http://dx.doi.org/10.18267/j.aip.77.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Hamby, Sherry. "Coercion, Access, and Control". Criminal Justice Review 43, n.º 1 (13 de fevereiro de 2018): 5–9. http://dx.doi.org/10.1177/0734016817751581.

Texto completo da fonte
Resumo:
This special issue on drugging presents five articles that make important contributions to this still emerging literature. Although historical incidents of drugging, which is the nonconsensual administration of psychoactive substances, have been documented for decades, scientific scholarship on this phenomenon is relatively new. These articles provide in-depth consideration of conceptual issues around this behavior, which can be difficult to detect and is not always perceived as an offense by young adults. The authors also contribute important new quantitative and qualitative data on a range of risk factors include differential vulnerability across racial groups and sexual identities. Data on victimization responses and revictimization are presented. Regarding perpetrators, an analysis of the media treatment of high-status perpetrators, in this case medical professionals, also illuminates ongoing challenges in the social perceptions of drugging and the criminal status of the offense.
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Ye, Shuiming, Ying Luo, Jian Zhao e Sen-ChingS Cheung. "Anonymous Biometric Access Control". EURASIP Journal on Information Security 2009, n.º 1 (2009): 865259. http://dx.doi.org/10.1186/1687-417x-2009-865259.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Toledo, Rodolfo, Angel Nunez, Eric Tanter e Jacques Noye. "Aspectizing Java Access Control". IEEE Transactions on Software Engineering 38, n.º 1 (janeiro de 2012): 101–17. http://dx.doi.org/10.1109/tse.2011.6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Toledo, Rodolfo, e Eric Tanter. "Access Control in JavaScript". IEEE Software 28, n.º 5 (setembro de 2011): 76–84. http://dx.doi.org/10.1109/ms.2010.154.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Alhamdani, Wasim A. "Resilent Access Control Model". Journal of Applied Security Research 12, n.º 4 (2 de outubro de 2017): 478–96. http://dx.doi.org/10.1080/19361610.2017.1354273.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Barker, Steve, Marek J. Sergot e Duminda Wijesekera. "Status-Based Access Control". ACM Transactions on Information and System Security 12, n.º 1 (outubro de 2008): 1–47. http://dx.doi.org/10.1145/1410234.1410235.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Stevens, Gunnar, e Volker Wulf. "Computer-supported access control". ACM Transactions on Computer-Human Interaction 16, n.º 3 (setembro de 2009): 1–26. http://dx.doi.org/10.1145/1592440.1592441.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Stankovski, Stevan, Gordana Ostojic, Nikola Djukic, Srdjan Tegeltija e Aleksandar Milojkovic. "Bluetooth parking access control". Sensor Review 34, n.º 3 (10 de junho de 2014): 244–54. http://dx.doi.org/10.1108/sr-06-2012-643.

Texto completo da fonte
Resumo:
Purpose – The purpose of this paper is to describe an approach of using mobile phones with Bluetooth technology to enter/exit restricted area. Design/methodology/approach – Applied Bluetooth technology implemented in mobile phones enables the user to perform the identification and the state of presence while entering/exiting the parking space without stopping the vehicle. For the successful implementation of this method for presence detection and proper identification, it is necessary to determine the values of the Bluetooth signal. Findings – This paper discuses a case study that has been done at entry/exit of parking lots. The obtained experimental results show that mobile phones with the Bluetooth technology can be successfully applied as presence detection sensors, as well as in processes for the identification of the user/object in the move. Practical implications – The paper gives a primer how mobile phones with Bluetooth technology, in addition to their basic purpose, can be used as identification devices to enter/exit restricted area. Originality/value – The users have possibilities to access restricted area using a common device – a mobile phone with Bluetooth technology. Successful implementation of developed access control system is based on determining the proper value of the Bluetooth signal strength field that extends around the control cabinet in which the Bluetooth devices are situated.
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Hu, Vincent C., D. Richard Kuhn e David F. Ferraiolo. "Attribute-Based Access Control". Computer 48, n.º 2 (fevereiro de 2015): 85–88. http://dx.doi.org/10.1109/mc.2015.33.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Moffett, Jonathan D., e Morris S. Sloman. "Content-dependent access control". ACM SIGOPS Operating Systems Review 25, n.º 2 (abril de 1991): 63–70. http://dx.doi.org/10.1145/122120.122125.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Hu, Vincent C., e Rick Kuhn. "Access Control Policy Verification". Computer 49, n.º 12 (dezembro de 2016): 80–83. http://dx.doi.org/10.1109/mc.2016.368.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Nicola, Rocco De, GianLuigi Ferrari, Rosario Pugliese e Betti Venneri. "Types for access control". Theoretical Computer Science 240, n.º 1 (junho de 2000): 215–54. http://dx.doi.org/10.1016/s0304-3975(99)00232-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Murray, Bill. "Security and access control". Computer Fraud & Security Bulletin 1992, n.º 12 (dezembro de 1992): 10–15. http://dx.doi.org/10.1016/s0142-0496(09)90145-x.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Parker, T. A. "Network access control developments". Computer Audit Update 1990, n.º 6 (janeiro de 1990): 3–10. http://dx.doi.org/10.1016/s0960-2593(05)80056-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Jackson, Keith. "Horatius access control system". Computer Fraud & Security Bulletin 11, n.º 6 (abril de 1989): 17–19. http://dx.doi.org/10.1016/0142-0496(89)90204-x.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Gan, Guohua, E. Chen, Zhiyuan Zhou e Yan Zhu. "Token-Based Access Control". IEEE Access 8 (2020): 54189–99. http://dx.doi.org/10.1109/access.2020.2979746.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Domingo-Ferrer, Joseph. "Algorithm- sequenced access control". Computers & Security 10, n.º 7 (novembro de 1991): 639–52. http://dx.doi.org/10.1016/0167-4048(91)90122-t.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Parker, Tom. "Role based access control". Computers & Security 14, n.º 5 (janeiro de 1995): 418. http://dx.doi.org/10.1016/0167-4048(95)97115-q.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Bhatia, Rekha, e Manpreet Singh Gujral. "Privacy Aware Access Control". International Journal of Information Technologies and Systems Approach 10, n.º 2 (julho de 2017): 17–30. http://dx.doi.org/10.4018/ijitsa.2017070102.

Texto completo da fonte
Resumo:
Due to the ever increasing number of web services available through the Internet, the privacy as a fundamental human right is endangered. Informed consent and collection of information are two important aspects while interacting on the Internet through web services. The ease of data access and the ready availability of it through Internet, made it easier for interested parties to intrude into the individual's privacy in unprecedented ways. The regulatory and technical solutions adopted to curb this have achieved only a limited success. The main culprits in this regard are the incompatibilities in the regulatory measures and standards. This research work focuses on privacy preserving access control for sharing sensitive information in the arena of web services, provides some recent outlooks towards the critical need of privacy aware access control technologies and a comprehensive review of the existing work in this arena. Besides, a novel framework for privacy aware access to web services is also provided.
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Ye, Shuiming, Ying Luo, Jian Zhao e Sen-Ching S. Cheung. "Anonymous Biometric Access Control". EURASIP Journal on Information Security 2009 (2009): 1–17. http://dx.doi.org/10.1155/2009/865259.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

КОРЧИНСЬКИЙ, ВОЛОДИМИР, ІРИНА ТАРАСЕНКО, СЕРГІЙ РАЦИБОРИНСЬКИЙ, ОЛЕКСАНДР АКАЄВ e АРТЕМ ХАДЖИОГЛО. "AUTOMATED ACCESS CONTROL SYSTEMS". Herald of Khmelnytskyi National University. Technical sciences 331, n.º 1 (29 de fevereiro de 2024): 291–96. http://dx.doi.org/10.31891/2307-5732-2024-331-44.

Texto completo da fonte
Resumo:
The paper provides an overview and analysis of the problems in the application of automated access control systems based on NFC. The capabilities of the Arduino platform are investigated and an access control system with an RFID-NFC module is developed on its basis. The use of automated access control systems in the modern world is becoming increasingly relevant. It involves a number of benefits that such systems can bring to businesses and other entities. These systems simplify and speed up the process of identifying a person, save time and increase the efficiency of security services, but still require human control. RFID-NFC technology is up-to-date, so the development and use of this technology for an access control system can solve the problem of unauthorized access to premises and/or controlled areas. Also, a company/enterprise can save money on identification devices, since various documents with an embedded NFC tag can be used as an identifier. For example, it can be a passport of a citizen of Ukraine, a passport of a citizen of Ukraine for travelling abroad, a certificate of registration, bank cards and a smartphone with NFC function, etc. An automated access control system is a set of advanced technologies and software designed to control and restrict access to a specific private territory/controlled area. The main purpose of an automated access control system is to ensure security, control and monitoring of access to a private territory/controlled area. Such systems are used to identify personnel, vehicles, etc. that have access to a restricted area/controlled zone. Access control systems can be integrated with other security systems, such as video surveillance systems, intrusion detection/prevention systems, etc.
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

DUNDUA, Besik, Khimuri RUKHAIA, Mikheili RUKHAIA e Lali TIBUA. "PρLog for Access Control". Journal of Technical Science and Technologies 5, n.º 2 (6 de fevereiro de 2017): 41–44. http://dx.doi.org/10.31578/jtst.v5i2.108.

Texto completo da fonte
Resumo:
In this article we show how access control policies can be expressed in PρLog,which is a system for programming with conditional transformation rules, controlledby strategies. PρLog combines the power of logic programming withrewriting, which makes it convenient to reason about the policies.
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Kim, Jinsu, e Namje Park. "Role Based Access Control based File Access Control Mechanism with Smart Contract". Journal of Korean Institute of Information Technology 17, n.º 9 (30 de setembro de 2019): 113–21. http://dx.doi.org/10.14801/jkiit.2019.17.9.113.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Bertolino, Antonia, Said Daoudagh, Francesca Lonetti, Eda Marchetti e Louis Schilders. "Automated testing of eXtensible Access Control Markup Language‐based access control systems". IET Software 7, n.º 4 (agosto de 2013): 203–12. http://dx.doi.org/10.1049/iet-sen.2012.0101.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Lobo, Jorge. "Relationship-based access control: More than a social network access control model". Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 9, n.º 2 (6 de setembro de 2018): e1282. http://dx.doi.org/10.1002/widm.1282.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Lijun Chen, S. H. Low e J. C. Doyle. "Random Access Game and Medium Access Control Design". IEEE/ACM Transactions on Networking 18, n.º 4 (agosto de 2010): 1303–16. http://dx.doi.org/10.1109/tnet.2010.2041066.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Zhu, Nafei, Fangbo Cai, Jingsha He, Yixuan Zhang, Wenxin Li e Zhao Li. "Management of access privileges for dynamic access control". Cluster Computing 22, S4 (24 de fevereiro de 2018): 8899–917. http://dx.doi.org/10.1007/s10586-018-2018-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Lun-wei, Wang, Liao Xiang-ke e Wang Huai-min. "Access request trustworthiness in weighted access control framework". Wuhan University Journal of Natural Sciences 10, n.º 1 (janeiro de 2005): 65–69. http://dx.doi.org/10.1007/bf02828619.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Danilescu, Marcel, e Victor Besliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES". Journal of Engineering Science XXVIII, n.º 2 (junho de 2021): 67–78. http://dx.doi.org/10.52326/jes.utm.2021.28(2).05.

Texto completo da fonte
Resumo:
In recent decades, the number of researches on access control and user actions in computer systems has increased. Over time, there have been two models of implementing Mandatory Access Control (MAC) policies for government institutions and Discretionary Access Control (DAC) for the business environment, policies that various access control modeling solutions seek to implement. Among the access control modeling solutions developed are Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), presented in the U.S.A. by the National Institute of Standard and Technology (NIST). In Romania, in 2010, the access control solution based on trust was presented. This paper presents Mandatory Access Control policy modeling using the trust-based access and actions control modeling solution.
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Osborn, Sylvia, Ravi Sandhu e Qamar Munawer. "Configuring role-based access control to enforce mandatory and discretionary access control policies". ACM Transactions on Information and System Security 3, n.º 2 (maio de 2000): 85–106. http://dx.doi.org/10.1145/354876.354878.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Zhang, Rui, Fausto Giunchiglia, Bruno Crispo e Lingyang Song. "Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment". Wireless Personal Communications 55, n.º 1 (5 de agosto de 2009): 5–17. http://dx.doi.org/10.1007/s11277-009-9782-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Jain, Taniya. "Secure Big Data Access Control Policies for Cloud Computing Environment". International Journal of Innovative Research in Computer Science & Technology 5, n.º 2 (31 de março de 2017): 253–56. http://dx.doi.org/10.21276/ijircst.2017.5.2.8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia