Добірка наукової літератури з теми "Access list"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Access list".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Access list"
Pleszkun, A. R., and M. J. Thazhuthaveetil. "An architecture for efficient Lisp list access." ACM SIGARCH Computer Architecture News 14, no. 2 (May 1986): 191–98. http://dx.doi.org/10.1145/17356.17378.
Повний текст джерелаSetapa, Sharipah, and Tengku Puteri Suhilah. "An Access Control List for Role-Based System: An Observation and Recommendation." International Journal of Information and Education Technology 4, no. 6 (2014): 468–72. http://dx.doi.org/10.7763/ijiet.2014.v4.452.
Повний текст джерелаKim, No-Whan. "The case study to verify of a network based on router applying an ACL(: Access List)." Journal of the Korea institute of electronic communication sciences 11, no. 5 (May 31, 2016): 491–98. http://dx.doi.org/10.13067/jkiecs.2016.11.5.491.
Повний текст джерелаThazhuthaveetil, Matthew J., and Andrew R. Pleszkun. "On the structural locality of reference in LISP list access streams." Information Processing Letters 26, no. 2 (October 1987): 105–10. http://dx.doi.org/10.1016/0020-0190(87)90046-9.
Повний текст джерелаMcMullen, Anthony. "Resist the list." Bottom Line 27, no. 1 (May 6, 2014): 2–5. http://dx.doi.org/10.1108/bl-02-2014-0005.
Повний текст джерелаA.B., Chate, and Chirchi V.R. "Access Control List Provides Security in Network." International Journal of Computer Applications 121, no. 22 (July 18, 2015): 14–16. http://dx.doi.org/10.5120/21831-5090.
Повний текст джерелаShchukin, V. Yu. "List decoding for a multiple access hyperchannel." Problems of Information Transmission 52, no. 4 (October 2016): 329–43. http://dx.doi.org/10.1134/s0032946016040025.
Повний текст джерелаDuffin, Christian. "Internet access high on nurses’ wish list." Nursing Management 7, no. 2 (May 1, 2000): 5. http://dx.doi.org/10.7748/nm.7.2.5.s5.
Повний текст джерелаKiberd, B., J. Boudreault, V. Bhan, and R. Panek. "Access to the Kidney Transplant Wait List." American Journal of Transplantation 6, no. 11 (November 2006): 2714–20. http://dx.doi.org/10.1111/j.1600-6143.2006.01523.x.
Повний текст джерелаZENG, Kuang-Yi. "Towards the Optimization of Access Control List." Journal of Software 18, no. 4 (2007): 978. http://dx.doi.org/10.1360/jos180978.
Повний текст джерелаДисертації з теми "Access list"
Allen, Steven D. M. Eng Massachusetts Institute of Technology. "DRACL (Decentralized resource access control list)." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/112855.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references (pages 132-135).
DRACL is a privacy-preserving, scalable, secure, and developer and user friendly federated access control system. It allows producers to manage, through a single authentication provider, which consumers can access what content across all content hosts that support the DRACL protocol. It preserves user privacy by not revealing the producers' social networks to content hosts and consumers and allowing content consumers to access content anonymously. Unlike existing solutions, DRACL is federated (cf. Facebook Connect, Google Sign-In), does not have a single point of failure (cf. Mozilla Persona, OpenID), and does not reveal its producers' social networks to content hosts (cf. Facebook Connect's user_friends permission).
by Steven D. Allen.
M. Eng.
Гаврилін, В. В. "Контроль та захист корпоративної мережі з використанням технологій VLAN та Access List". Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72100.
Повний текст джерелаJosic, Petar, and Marko Järvitalo. "Framtagning av analysverktyg för materialförbrukning inom motorunderhåll." Thesis, Högskolan Väst, Avd för maskinteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-4487.
Повний текст джерелаThe thesis report describes the way of creating an analysis tool for material consumption at the department of engine service at Volvo Aero Corporation. The analysis tool generates average lists and purchase lists for PW100 engine. The documentation of the analysis tool is described in seven parts. By using the tool the structural material planner can in an easy manner generate lists that are based on earlier historical data. Instead of creating lists manually the material planner can gain more accurate lists much faster. Previously there were no fact based results in comparison with today. Pre studies were made to gain a better insight of the current organization and processes at the engine service department. Interviews with staff as well literature studies in the field of storage and spare parts manage has given possibilities to create an analysis tool. Plan of requirements were created to specify the features of the analysis tool. The program Microsoft Access was chosen due to the amout of data to construct the analysis tool. All information was brought from the database SAP. The analysis tool was built in three integrated parts: 1. Average list: shows the average consumption of material for selected engine and maintenance type. 2. Stock status: checks the stock for material for selected engine and maintenance type. New and used material is selectable. 3. Incoming material: shows incoming material that is undelivered for selected engine and maintenance type. By these three integrated parts the analysis tool generates a purchase list. The list contains engine type, material number, material description, quantity, price and ABC-classification. By implementing the analysis tool in the daily work purchases will be more accurate. Capital binding will decrease as well.
Matsson, Carl Philip. "Securing Microsoft Azure : Automatic Access Control List Rule Generation to Secure Microsoft Azure Cloud Networks." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-55295.
Повний текст джерелаHermansson, Christopher, and Sebastian Johansson. "Segmentering av lokala nätverk - För mikro- och småorganisationer." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5903.
Повний текст джерелаSyftet med den här rapporten är att beskriva ett antal olika tillvägagångssätt man kan använda sig av då man har behov av att dela in ett lokalt nätverk i olika segment och med det även kunna reglera trafikflödet mellan segmenten. De lösningar som presenteras i arbetet är inriktade mot mikro- och småföretag.Anledningen till att vi har valt att arbeta med det här området är att vi anser att det är viktigt för organisationer att har en strukturerad och segmenterad design på sitt interna datornätverk.Vi har arbetat genom att i förväg samla in information om olika tekniker som kan tänkas lösa vårt problem, och därefter testat olika scenarion med dessa tekniker. Data har samlats in efter varje genomfört scenario och sammanställts i statistisk form för att kunna avgöra vilken metod som var att föredra.Vi har testat lösningar där man segmenterar nätverket i en lager 2-switch medan man möjliggör och förhindrar trafikflöde mellan segmenten i en router. Även lösningar där man använder en lager 3-switch har testats. På så sätt kan routningen ske direkt i switchen och det blir betydligt mindre belastning i routern. Resultatet visar att då man vill segmentera ett nätverk så är det rekommenderat att man använder sig av VLAN och ACL:er och eventuellt i kombination med en brandvägg.Slutresultatet av rapporten är att en lösning med ”router on a stick” är den billigaste lösningen och troligen den som de flesta mindre företag skulle klara sig med. Vilken lösning man väljer beror dock helt på hur mycket pengar man vill lägga på sitt nätverk samt vad kraven är.
The purpose of this report is to describe a number of approaches that can be used when you are in need of dividing a local area network in a number of segments, and with that also be able to control how data traffic is allowed to traverse between the different segments. The solutions that are presented are focused towards micro and small companies.The reason that we have chosen to work with this matter is that we believe it is important for organizations to have a structured and segmented design of its internal computer network.We have been working by in advance collecting information about various techniques that might solve our problem, and then testing different scenarios using these techniques. Data have been collected after each tested scenario and compiled in statistical form in order to determine which method that was preferable.We have been testing solutions were you segment the network in a layer 2 switch while you allow or deny communication between the segments in a router, and also solutions were you use a layer 3 switch. In that way you can let the routing be performed in the switch, which leads to significantly lower load on the router. The result was that if you are about to segment a local area network it is recommended that you use VLAN and ACL:s, and possibly in combination with a firewall.The final result of this report is that a solution using the “router on a stick”-technique is the cheapest one, and probably the one that most small companies would get along with. However, the solution that you choose depends completely on how much money you want to spend on your network, and also what the needs are.
Шайдецький, Андрій Вікторович. "Система автоматизованого збору та перевірки налаштувань мережевого обладнання щодо відповідності політиці інформаційної безпеки". Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/27250.
Повний текст джерелаThe work consists of 78 pages, and contains 10 illustrations, 23 tables and 6 sources. The aim of the work is to develop a system for automated collection and validation of network settings. The scope of research in this paper was chosen for the topic of network equipment settings, taking into account the best practices developed by CISCO. The result of the work is the formulated list of rules and policies that must be activated on the network equipment as well as a software tool that automates the testing of network equipment settings for compliance with the rules. Testing of the developed software on the CISCO virtual router has been carried out, according to the results, the goal of the diploma achieved.
Hozza, Tomáš. "Statická analýza počítačových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236493.
Повний текст джерелаГоловач, М. В. "Інформаційна технологія керування списками контролю доступу на роутерах Cisco". Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72184.
Повний текст джерелаPladys, Adélaïde. "Hémodialyse quotidienne en France : caractéristiques, trajectoires, accès à la greffe et survie des patients." Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1B020/document.
Повний текст джерелаAn increase frequency of weekly sessions of Hemodialysis (HD) should be more physiological than a conventional HD 3x/week. Daily Hemodialysis (DHD) was developed in order to enhance patients’ quality of life in addition to blood purification. Nevertheless, its effect on survival remains controversial and the association between DHD and the access to renal transplantation has never been evaluated. Moreover, knowledges about DHD practices in France were until today very poor. In this context, the aims of this thesis was firstly, to describe profiles of French patients on DHD and their initial trajectories; secondly to analyze the association between DHD and renal transplantation, then survival in comparison with conventional HD 3x/week. An epidemiologic study has been conducted based on Renal Epidemiology and Information in Nephrology (REIN) registry. Were included all patients aged ≥18 years who initiated a DHD between 2003 and 2012 in France. Bio-clinical data analyses showed that French patients were characterized to present various profiles. Indeed, according to the median age (64 years), two sub-groups were distinguished and compared: old (mean age: 76.6 ± 6.9 years) in bad medical conditions who died rapidly; young (mean age: 47.2 ± 12 years) waiting for renal transplantation. Moreover, according to the initial trajectories, two sub-groups were also constructed: patients starting directly with DHD (dDHD, n=257); patients starting with another dialysis before switching for DHD (cDHD, n=496). Then, this thesis allowed showing that in France and after being waitlisting, patients on DHD had lower probability of being renal transplanted (SHR=0.74; 95%CI: 0.58-0.95). Then, after the adjustment on sex, age and comorbidities, DHD was associated with a higher risk of death compared to conventional HD 3sessions/week. Reasons why a patient started a DHD are unknown, but this work allows us to enhance our knowledges in terms of medical practices associated with DHD. We hypothesized that DHD indications in France might be different from other countries which could explain our results in terms of mortality
Macků, Jiří. "Simulace chování sítě na základě analýzy konfiguračních souborů aktivních síťových zařízení." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235907.
Повний текст джерелаКниги з теми "Access list"
Smart, Maureen. Access: Reading list. London: Centre on Environment for the Handicapped, 1988.
Знайти повний текст джерелаConsortium, Hertfordshire Access. List of recognised access courses to higher education 1995-1996. Hatfield: Hertfordshire Access Consortium, 1996.
Знайти повний текст джерелаRodgers, Mary Columbro. First access list to the Mary Columbro Rodgers Literary Trust. [Hyattsville, Md: Open University of America Press], 1994.
Знайти повний текст джерелаRodgers, Mary Columbro. Third access list to the Mary Columbro Rodgers Literary Trust, by subject. [Hyattsville, Md: Open University of America Press], 1998.
Знайти повний текст джерелаBrennan, James F. Needle in a haystack: FOIL's subject matter list requirement : are agencies complying? Albany, N.Y.?: The Assembly?, 2005.
Знайти повний текст джерелаGreat Britain. Parliament. House of Lords. Access to justice bill: Marshalled list of amendments to be moved on consideration of commons amendments. London: Stationery Office, 1999.
Знайти повний текст джерелаGreat Britain. Parliament. House of Lords. Access to justice bill [H.L.]: Marshalled list of motions and amendments to be moved on consideration of Commons amendments. London: Stationery Office, 1999.
Знайти повний текст джерелаCisco IOS access lists. Sebastopol, CA: O'Reilly & Associates, 2001.
Знайти повний текст джерелаWestern Australia. Office of the Auditor General. Patients waiting: Access to elective surgery in Western Australia : performance examination. West Perth, W.A: Auditor General, 2002.
Знайти повний текст джерелаBarstow, Barbara. Beyond picture books: Subject access to best books for beginning readers. 3rd ed. Westport, Conn: Libraries Unlimited, 2008.
Знайти повний текст джерелаЧастини книг з теми "Access list"
Weik, Martin H. "access list." In Computer Science and Communications Dictionary, 12. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_132.
Повний текст джерелаWeik, Martin H. "access control list." In Computer Science and Communications Dictionary, 10. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_116.
Повний текст джерелаWeik, Martin H. "list-based access control." In Computer Science and Communications Dictionary, 909. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_10398.
Повний текст джерелаZonderland, Maartje E. "Access Time and Waiting List Management." In SpringerBriefs in Health Care Management and Economics, 27–32. Boston, MA: Springer US, 2014. http://dx.doi.org/10.1007/978-1-4899-7451-8_4.
Повний текст джерелаLi, Shou-peng, Shi-zhong Wu, and Tao Guo. "The Consistency of an Access Control List." In Information and Communications Security, 367–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36159-6_31.
Повний текст джерелаIshikawa, Takumichi, and Noriaki Yoshiura. "Decreasing Access Control List Processed in Hardware." In Management Enabling the Future Internet for Changing Business and New Computing Services, 453–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04492-2_51.
Повний текст джерелаYu, Bencheng, and Ran Wang. "Research of Access Control List in Enterprise Network Management." In Lecture Notes in Electrical Engineering, 121–29. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4805-0_15.
Повний текст джерелаRechert, Klaus, Thomas Liebetraut, Dennis Wehrle, and Euan Cochrane. "Preserving Containers – Requirements and a Todo-List." In Digital Libraries: Knowledge, Information, and Data in an Open Access Society, 225–30. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49304-6_27.
Повний текст джерелаRaju, K. D. "Patent Linkages and Its Impact on Access to Medicines: Challenges, Opportunities for Developing Countries." In Access to Medicines and Vaccines, 329–69. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83114-1_12.
Повний текст джерелаQian, Jiang, Susan Hinrichs, and Klara Nahrstedt. "ACLA: A Framework for Access Control List (ACL) Analysis and Optimization." In Communications and Multimedia Security Issues of the New Century, 197–211. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/978-0-387-35413-2_18.
Повний текст джерелаТези доповідей конференцій з теми "Access list"
Wakabayashi, Kei, Daisuke Kotani, and Yasuo Okabe. "Traffic-aware Access Control List Reconstruction." In 2020 International Conference on Information Networking (ICOIN). IEEE, 2020. http://dx.doi.org/10.1109/icoin48656.2020.9016512.
Повний текст джерелаNanda, Shradha S., Kalyan Das, Jagamohan Padhi, and Santwana Hota. "Advanced move-to-front for list access problem." In 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE, 2016. http://dx.doi.org/10.1109/iccpct.2016.7530202.
Повний текст джерелаSayama, Hirokazu, and Noriaki Yoshiura. "Test tool for equivalence of access control list." In 2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2012. http://dx.doi.org/10.1109/apnoms.2012.6356103.
Повний текст джерелаTrandafir, Ruxandra, Mihai Carabas, Razvan Rughinis, and Nicolae Tapus. "FirewallPK: Security tool for centralized Access Control List management." In 2014 Joint Networking in Education and Research Conference (RoEduNet/RENAM). IEEE, 2014. http://dx.doi.org/10.1109/roedunet-renam.2014.6955309.
Повний текст джерелаCreighton, M. A., P. J. Crepeau, and J. K. Omura. "Multiple Access Performance of FH/NCMFSK with List Decoding." In 1987 IEEE Military Communications Conference - Crisis Communications: The Promise and Reality. IEEE, 1987. http://dx.doi.org/10.1109/milcom.1987.4795353.
Повний текст джерелаKanghee Lee, Zhefan Jiang, Sangok Kim, Sangwook Kim, and Sunkyung Kim. "Access Control List Mediation System for Large-Scale Network." In Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05). IEEE, 2005. http://dx.doi.org/10.1109/pdcat.2005.59.
Повний текст джерелаMaakoul, Oussama, Mohammed Amine Tajioue, Sara Hsaini, Salma Azzouzi, and My El Hassan Charaf. "Testing Access Control List Policies in a Hadoop Environment." In 2020 7th International Conference on Control, Decision and Information Technologies (CoDIT). IEEE, 2020. http://dx.doi.org/10.1109/codit49905.2020.9263817.
Повний текст джерелаPérez-Iglesias, Joaquín. "Query Performance Prediction Based on Ranking List Dispersion." In Third BCS-IRSG Symposium on Future Directions in Information Access (FDIA 2009). BCS Learning & Development, 2009. http://dx.doi.org/10.14236/ewic/fdia2009.5.
Повний текст джерелаKang, JungMin, and DoHoon Lee. "Advanced White List Approach for Preventing Access to Phishing Sites." In 2007 International Conference on Convergence Information Technology (ICCIT 2007). IEEE, 2007. http://dx.doi.org/10.1109/iccit.2007.50.
Повний текст джерелаKang, JungMin, and DoHoon Lee. "Advanced White List Approach for Preventing Access to Phishing Sites." In 2007 International Conference on Convergence Information Technology (ICCIT 2007). IEEE, 2007. http://dx.doi.org/10.1109/iccit.2007.4420308.
Повний текст джерелаЗвіти організацій з теми "Access list"
Melnikov, A. IMAP4 Access Control List (ACL) Extension. RFC Editor, December 2005. http://dx.doi.org/10.17487/rfc4314.
Повний текст джерелаSparks, R. IMAP Access to IETF Email List Archives. RFC Editor, August 2013. http://dx.doi.org/10.17487/rfc7017.
Повний текст джерелаLeiba, B., and A. Melnikov. Internet Message Access Protocol version 4 - LIST Command Extensions. RFC Editor, June 2008. http://dx.doi.org/10.17487/rfc5258.
Повний текст джерелаSantesson, S., and R. Housley. Internet X.509 Public Key Infrastructure Authority Information Access Certificate Revocation List (CRL) Extension. RFC Editor, December 2005. http://dx.doi.org/10.17487/rfc4325.
Повний текст джерелаPARSONS ENGINEERING SCIENCE INC ATLANTAGA. Trusted Unix Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the Unix System. Fort Belvoir, VA: Defense Technical Information Center, August 1989. http://dx.doi.org/10.21236/ada385612.
Повний текст джерелаCollington, Rosie, and William Lazonick. Pricing for Medicine Innovation: A Regulatory Approach to Support Drug Development and Patient Access. Institute for New Economic Thinking Working Paper Series, January 2022. http://dx.doi.org/10.36687/inetwp176.
Повний текст джерелаKindt, Roeland, Ian K Dawson, Jens-Peter B Lillesø, Alice Muchugi, Fabio Pedercini, and James M Roshetko. The one hundred tree species prioritized for planting in the tropics and subtropics as indicated by database mining. World Agroforestry, 2021. http://dx.doi.org/10.5716/wp21001.pdf.
Повний текст джерелаPradeep Kumar, Kaavya. Climate Change Glossary. Indian Institute for Human Settlements, 2021. http://dx.doi.org/10.24943/ccgemthk02.2021.
Повний текст джерелаJethanandani, M., S. Agarwal, L. Huang, and D. Blair. YANG Data Model for Network Access Control Lists (ACLs). RFC Editor, March 2019. http://dx.doi.org/10.17487/rfc8519.
Повний текст джерелаThompson, Joseph, Wade H. Grimm, and Stephen E. Kelley. QUIC-LIFT (Trade Mark) Ladder Access System Product Evaluation Report. Fort Belvoir, VA: Defense Technical Information Center, October 1995. http://dx.doi.org/10.21236/ada286854.
Повний текст джерела