Добірка наукової літератури з теми "Access control"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Access control".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Access control"
Chepuru, Anitha, Dr K. Venugopal Rao, and Amardeep Matta. "Server Access Control." International Journal of Scientific Research 1, no. 7 (June 1, 2012): 78–79. http://dx.doi.org/10.15373/22778179/dec2012/31.
Повний текст джерелаAbd-Ali, Jamal. "A Metamodel for Hybrid Access Control Policies." Journal of Software 10, no. 7 (July 2015): 784–87. http://dx.doi.org/10.17706//jsw.10.7.784-797.
Повний текст джерелаSaunders, G., M. Hitchens, and V. Varadharajan. "Role-based access control and the access control matrix." ACM SIGOPS Operating Systems Review 35, no. 4 (October 2001): 6–20. http://dx.doi.org/10.1145/506084.506085.
Повний текст джерелаPenelova, Maria. "Access Control Models." Cybernetics and Information Technologies 21, no. 4 (December 1, 2021): 77–104. http://dx.doi.org/10.2478/cait-2021-0044.
Повний текст джерелаSchuldt, Alison. "PAR access control." Nature Reviews Molecular Cell Biology 12, no. 11 (October 21, 2011): 693. http://dx.doi.org/10.1038/nrm3220.
Повний текст джерелаSubramanian, Savithri. "Control and access." Contributions to Indian Sociology 42, no. 1 (April 2008): 93–122. http://dx.doi.org/10.1177/006996670704200105.
Повний текст джерелаFriedman, Michael. "Access-control software." Computers & Security 7, no. 5 (October 1988): 523. http://dx.doi.org/10.1016/0167-4048(88)90293-3.
Повний текст джерелаCollinson, Helen. "Workstation access control." Computers & Security 14, no. 2 (January 1995): 121. http://dx.doi.org/10.1016/0167-4048(95)90061-6.
Повний текст джерелаZuva, T. "Hybridization of Bimodal Biometrics for Access Control Authentication." International Journal of Future Computer and Communication 3, no. 6 (December 2014): 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.
Повний текст джерелаShuriya.b, Shuriya b. "Role based Access Control using Cp-Abe Algorithm." Indian Journal of Applied Research 4, no. 7 (October 1, 2011): 171–72. http://dx.doi.org/10.15373/2249555x/july2014/51.
Повний текст джерелаДисертації з теми "Access control"
SILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.
Повний текст джерелаO uso de computação distribuída vem expandindo seu escopo, saindo de aplicações em redes locais para aplicações envolvendo diversas instituições. Em termos de segurança, essa expansão introduz desafios em identificar usuários oriundos das diferentes organizações e definir seus direitos de acesso a determinado recurso. Abordagens comuns adotam a replicação do cadastro dos usuários pelas diversas instituições ou o compartilhamente de uma mesma identidade por um conjunto de usuários. Entretanto, essas estratégias apresentam deficiências, demandando, por exemplo, maior esforço de gerência por parte dos administradores e até esbarrando em políticas de privacidade. Neste trabalho propomos uma arquitetura que utiliza o conceito de papéis para a autenticação e o controle de acesso entre diferentes instituições. Baseado em uma relação de confiança entre as organizações, a arquitetura permite que os usuários sejam autenticados na instituições onde estão afiliados e utiliza o papel por eles desempenhados para controlar o acesso aos recursos disponibilizados pelas demais organizações.
Distributed computing has been expanding its scope from local area network applications to wide-area applications, involving different organizations. This expansion implies in several new security challenges, such as the identification of users originating from different organizations and the definition of their access rights. Commom aproaches involve replicating user data in several institutions or sharing identities among sets of users. However, these approaches have several limitations, sucj as the increased management effort of administrators or problems with privacy policies. This work proposes a framework for inter-institucional authentication. The framework is based on the concepts of RBAC (role-based access control) and of trust between organizations.
Atkins, Derek A. (Derek Allan). "Media Bank--access and access control." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/61086.
Повний текст джерелаMay, Brian 1975. "Scalable access control." Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.
Повний текст джерелаde, la Motte L. "Professional Access Control." Thesis, Honours thesis, University of Tasmania, 2004. https://eprints.utas.edu.au/118/1/front_Thesis.pdf.
Повний текст джерелаHoppenstand, Gregory S. "Secure access control with high access precision/." Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/23386.
Повний текст джерелаMagnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.
Повний текст джерелаRole based access control (RBAC) is widely used in health care systems today. Some of the biggest systems in use at Norwegian hospitals utilizes role based integration. The basic concept of RBAC is that users are assigned to roles, permissions are assigned to roles and users acquire permissions by being members of roles. An alternative approach to the role based access distribution, is that information should be available only to those who are taking active part in a patients treatment. This approach is called decision based access control (DBAC). While some RBAC implementations grant access to a groups of people by ward, DBAC ensures that access to relevant parts of the patients medical record is given for treatment purposes regardless of which department the health care worker belongs to. Until now the granularity which the legal framework describes has been difficult to follow. The practical approach has been to grant access to entire wards or organizational units in which the patient currently resides. Due to the protection of personal privacy, it is not acceptable that any medical record is available to every clinician at all times. The most important reason to implement DBAC where RBAC exists today, is to get an access control model that is more dynamic. The users should have the access they need to perform their job at all times, but not more access than needed. With RBAC, practice has shown that it is very hard to make dynamic access rules when properties such as time and tasks of an employees work change. This study reveals that pretty much all security measures in the RBAC systems can be overridden by the use of emergency access features. These features are used extensively in everyday work at the hospitals, and thereby creates a security risk. At the same time conformance with the legal framework is not maintained. Two scenarios are simulated in a fictional RBAC and DBAC environment in this report. The results of the simulation show that a complete audit of the logs containing access right enhancements in the RBAC environment is unfeasible at a large hospital, and even checking a few percent of the entries is also a very large job. Changing from RBAC to DBAC would probably affect this situation to the better. Some economical advantages are also pointed out. If a change is made, a considerable amount of time that is used by health care workers to unblock access to information they need in their everyday work will be saved.
Macfie, Alex. "Semantic role-based access control." Thesis, University of Westminster, 2014. https://westminsterresearch.westminster.ac.uk/item/964y2/semantic-role-based-access-control.
Повний текст джерелаSchmidt, Ronald. "Distributed Access Control System." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100336.
Повний текст джерелаKnight, G. S. "Scenario-based access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.
Повний текст джерелаLukefahr, Joseph W. "Service-oriented access control." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43948.
Повний текст джерелаAs networks grow in complexity and data breaches become more costly, network administrators need better tools to help design networks that provide service-level availability while restricting unauthorized access. Current research, specifically in declarative network management, has sought to address this problem but fails to bridge the gap between service-level requirements and low-level configuration directives. We introduce service-oriented access control, an approach that frames the problem in terms of maintaining service-level paths between users and applications. We show its use in several scenarios involving tactical networks typically seen in the military’s field artillery community.
Книги з теми "Access control"
Jenny, Baxter, and Key Note Publications, eds. Access control. 7th ed. Hampton: Key Note, 2005.
Знайти повний текст джерелаEmily, Pattullo, and Key Note Publications, eds. Access control. 4th ed. Hampton: Key Note, 2002.
Знайти повний текст джерелаJane, Griffiths, and Key Note Publications, eds. Access control. 6th ed. Hampton: Key Note, 2004.
Знайти повний текст джерелаDominic, Fenn, and Key Note Publications, eds. Access control. 2nd ed. Hampton: Key Note, 1999.
Знайти повний текст джерелаLarson, Jessica Megan. Snowflake Access Control. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8038-6.
Повний текст джерелаFerraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.
Знайти повний текст джерелаHoppenstand, Gregory S. Secure access control with high access precision. Monterey, California: Naval Postgraduate School, 1988.
Знайти повний текст джерелаKayem, Anne V. D. M., Selim G. Akl, and Patrick Martin. Adaptive Cryptographic Access Control. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-6655-1.
Повний текст джерелаBoonkrong, Sirapat. Authentication and Access Control. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.
Повний текст джерелаMike, Hunt, and Jordan& Sons Limited., eds. Britain's access control industry. London: Jordan, 1988.
Знайти повний текст джерелаЧастини книг з теми "Access control"
Malik, Waqar. "Access Control." In Learn Swift 2 on the Mac, 177–83. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1627-9_19.
Повний текст джерелаde Villiers, Sidriaan. "Access Control." In The Cyber Risk Handbook, 321–34. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119309741.ch22.
Повний текст джерелаYao, Jiewen, and Vincent Zimmer. "Access Control." In Building Secure Firmware, 335–82. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6106-4_10.
Повний текст джерелаMalik, Waqar. "Access Control." In Learn Swift on the Mac, 109–15. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0376-7_11.
Повний текст джерелаFerrari, Elena. "Access Control." In Encyclopedia of Database Systems, 1–6. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_6-3.
Повний текст джерелаYang, Kan. "Access Control." In Encyclopedia of Wireless Networks, 1–3. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_289.
Повний текст джерелаFerrari, Elena. "Access Control." In Encyclopedia of Database Systems, 7–11. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_6.
Повний текст джерелаPieprzyk, Josef, Thomas Hardjono, and Jennifer Seberry. "Access Control." In Fundamentals of Computer Security, 565–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-662-07324-7_17.
Повний текст джерелаShekhar, Shashi, and Hui Xiong. "Access Control." In Encyclopedia of GIS, 10. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-35973-1_14.
Повний текст джерелаYang, Kan. "Access Control." In Encyclopedia of Wireless Networks, 1–3. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_289-1.
Повний текст джерелаТези доповідей конференцій з теми "Access control"
Barker, Steve. "Personalizing access control by generalizing access control." In Proceeding of the 15th ACM symposium. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1809842.1809866.
Повний текст джерелаJaeger, Trent, Antony Edwards, and Xiaolan Zhang. "Managing access control policies using access control spaces." In the seventh ACM symposium. New York, New York, USA: ACM Press, 2002. http://dx.doi.org/10.1145/507711.507713.
Повний текст джерелаOsborn, Sylvia. "Mandatory access control and role-based access control revisited." In the second ACM workshop. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/266741.266751.
Повний текст джерелаSwaminathan, Kishore. "Negotiated Access Control." In 1985 IEEE Symposium on Security and Privacy. IEEE, 1985. http://dx.doi.org/10.1109/sp.1985.10019.
Повний текст джерелаLawson, Curt, and Feng Zhu. "Sentential access control." In the 50th Annual Southeast Regional Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2184512.2184582.
Повний текст джерелаGehani, Ashish, and Surendar Chandra. "Parameterized access control." In the 4th international conference. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1460877.1460922.
Повний текст джерелаNaldurg, Prasad, and Roy H. Campbell. "Dynamic access control." In the eighth ACM symposium. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/775412.775442.
Повний текст джерелаCautis, Bogdan. "Distributed access control." In the 12th ACM symposium. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1266840.1266850.
Повний текст джерелаArnab, Alapan, and Andrew Hutchison. "Persistent access control." In the 2007 ACM workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1314276.1314286.
Повний текст джерелаBarkley, John, Konstantin Beznosov, and Jinny Uppal. "Supporting relationships in access control using role based access control." In the fourth ACM workshop. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/319171.319177.
Повний текст джерелаЗвіти організацій з теми "Access control"
Stokes, E., D. Byrne, B. Blakley, and P. Behera. Access Control Requirements for LDAP. RFC Editor, May 2000. http://dx.doi.org/10.17487/rfc2820.
Повний текст джерелаTreado, Stephen J., Steven C. Cook, and Michael Galler. Distributed biometric access control testbed. Gaithersburg, MD: National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.ir.7190.
Повний текст джерелаHu, Vincent C., David F. Ferraiolo, and D. Rick Kuhn. Assessment of access control systems. Gaithersburg, MD: National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.ir.7316.
Повний текст джерелаQuirolgico, Stephen, Vincent Hu, and Tom Karygiannis. Access control for SAR systems. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7815.
Повний текст джерелаBierman, A., and M. Bjorklund. Network Configuration Access Control Model. RFC Editor, March 2018. http://dx.doi.org/10.17487/rfc8341.
Повний текст джерелаKoskelo, Markku, Steven Kadner, and Steven Horowitz. Biometric Access Control System Industrialization. Office of Scientific and Technical Information (OSTI), May 2020. http://dx.doi.org/10.2172/1763279.
Повний текст джерелаHu, Vincent C. Blockchain for Access Control Systems. National Institute of Standards and Technology, December 2021. http://dx.doi.org/10.6028/nist.ir.8403-draft.
Повний текст джерелаHu, Vincent C. Blockchain for Access Control Systems. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8403.
Повний текст джерелаHu, Vincent C. Access Control for NoSQL Databases. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8504.ipd.
Повний текст джерелаHu, Vincent. Access Control on NoSQL Databases. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.ir.8504.
Повний текст джерела