Статті в журналах з теми "Authentication authorization and accounting"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Authentication authorization and accounting".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Metz, C. "AAA protocols: authentication, authorization, and accounting for the Internet." IEEE Internet Computing 3, no. 6 (1999): 75–79. http://dx.doi.org/10.1109/4236.807015.
Повний текст джерелаWu, Wei-Chen, and Horng-Twu Liaw. "An authentication, authorization, and accounting mechanism for 3G/WLAN networks." Security and Communication Networks 9, no. 6 (July 2, 2013): 468–80. http://dx.doi.org/10.1002/sec.830.
Повний текст джерелаLopez-Fernandez, Luis, Micael Gallego, Boni Garcia, David Fernandez-Lopez, and Francisco Javier Lopez. "Authentication, Authorization, and Accounting in WebRTC PaaS Infrastructures: The Case of Kurento." IEEE Internet Computing 18, no. 6 (November 2014): 34–40. http://dx.doi.org/10.1109/mic.2014.102.
Повний текст джерелаLin, Phone, Shin-Ming Cheng, and Wanjiun Liao. "Modeling Key Caching for Mobile IP Authentication, Authorization, and Accounting (AAA) Services." IEEE Transactions on Vehicular Technology 58, no. 7 (September 2009): 3596–608. http://dx.doi.org/10.1109/tvt.2009.2015766.
Повний текст джерелаYu, Hewei, and Ziliang Li. "Handover Algorithm to Avoid Duplication Authentication Within or Between Proxy Mobile IPv6 Domains." International Journal of Interdisciplinary Telecommunications and Networking 11, no. 3 (July 2019): 1–10. http://dx.doi.org/10.4018/ijitn.2019070101.
Повний текст джерелаFauzi, Achmad, Joseph Dedy Irawan, and Nurlaily Vendyansyah. "RANCANG BANGUN SISTEM MANAJEMEN USER AAA (AUTHENTICATION, AUTHORIZATION, ACCOUNTING) DAN MONITORING JARINGAN HOTSPOT BERBASIS WEB." JATI (Jurnal Mahasiswa Teknik Informatika) 4, no. 1 (August 18, 2020): 176–83. http://dx.doi.org/10.36040/jati.v4i1.2328.
Повний текст джерелаSembiring, Abdul Sani. "Penerapan Model Protokol Aaa (Authentication, Authorization, Accounting) Pada Keamanan Jaringan Komunikasi Wan (Wide Area Network)." Jurnal Multimedia dan Teknologi Informasi (Jatilima) 2, no. 1 (March 5, 2022): 19–29. http://dx.doi.org/10.54209/jatilima.v2i1.140.
Повний текст джерелаOu, Hsia Hung, Hao Hsiang Ku, and Te Yu Chen. "The Concept of Extensible Authentication Protocol for Mobile Equipment to Heterogeneous Network (EAP-M2H)." Applied Mechanics and Materials 145 (December 2011): 204–8. http://dx.doi.org/10.4028/www.scientific.net/amm.145.204.
Повний текст джерелаZaghloul, S., and A. Jukan. "Signaling rate and performance for authentication, authorization, and accounting (AAA)) systems in all-IP cellular networks." IEEE Transactions on Wireless Communications 8, no. 6 (June 2009): 2960–71. http://dx.doi.org/10.1109/twc.2009.080105.
Повний текст джерелаLi, Dawei, Enzhun Zhang, Ming Lei, and Chunxiao Song. "Zero trust in edge computing environment: a blockchain based practical scheme." Mathematical Biosciences and Engineering 19, no. 4 (2022): 4196–216. http://dx.doi.org/10.3934/mbe.2022194.
Повний текст джерелаZúquete, André, Hélder Gomes, João Amaral, and Carlos Oliveira. "Security-Oriented Architecture for Managing IoT Deployments." Symmetry 11, no. 10 (October 19, 2019): 1315. http://dx.doi.org/10.3390/sym11101315.
Повний текст джерелаBilal, Muhammad, Muhammad Asif, and Abid Bashir. "Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications." Security and Communication Networks 2018 (November 1, 2018): 1–10. http://dx.doi.org/10.1155/2018/6315039.
Повний текст джерелаDimitrov, Dimitar, and Emanouil Atanassov. "Tools and Services for High Performance Computing." Cybernetics and Information Technologies 17, no. 5 (December 20, 2017): 81–88. http://dx.doi.org/10.1515/cait-2017-0057.
Повний текст джерелаRathee, Somvir, Anil Kumar, Sudha Kaushik, Edmundas Kazimieras Zavadskas, Audrius Banaitis, and Jose Arturo Garza-Reyes. "An MCDA cause-effect factors model for the implementation of Greenstone Digital Library software." Management Decision 58, no. 11 (June 16, 2020): 2543–64. http://dx.doi.org/10.1108/md-09-2019-1268.
Повний текст джерелаSaputra, Aldi Sigit, and Dadan Irwan. "Sistem Keamanan Pada Jaringan Wireless Menggunakan Protokol RADIUS." JUSS (Jurnal Sains dan Sistem Informasi) 3, no. 2 (December 31, 2020): 28–34. http://dx.doi.org/10.22437/juss.v3i2.10884.
Повний текст джерелаFerdiansyah, Pramudhita, Subektiningsih Subektiningsih, and Dhimas Adi Satria. "Manajemen Hotspot Mikrotik Menggunakan Freeradius dan Sistem Monitoring." J-SISKO TECH (Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD) 5, no. 2 (July 19, 2022): 153. http://dx.doi.org/10.53513/jsk.v5i2.5749.
Повний текст джерелаParamitha, Ardelia Puri, Adian F. Rochim, and Adnan Fauzi. "Design and Implementation Network Administrators Account Management System Based on Authentication, Authorization, and Accounting Based on TACACS and LDAP." IOP Conference Series: Materials Science and Engineering 803 (May 28, 2020): 012040. http://dx.doi.org/10.1088/1757-899x/803/1/012040.
Повний текст джерелаGanchev, Ivan, and Máirtín O’Droma. "Outsourcing Authentication, Authorization and Accounting, and Charging and Billing Services to Trusted Third Parties for Future Consumer-Oriented Wireless Communications." Electronics 12, no. 3 (January 21, 2023): 558. http://dx.doi.org/10.3390/electronics12030558.
Повний текст джерелаJ, Isac Gnanaraj, and Sriram . "A Framework to Enhance Security in Nemo Environment Using AAA Mechanisms." International Journal of Emerging Research in Management and Technology 6, no. 8 (June 25, 2018): 400. http://dx.doi.org/10.23956/ijermt.v6i8.172.
Повний текст джерелаGohar, Moneeb, Hind Ahmed M. Alrubaish, Ruba Suliman M. Alowaid, and Jin-Ghoo Choi. "Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/4180801.
Повний текст джерелаHussain, Md Equebal, and Mohammad Rashid Hussain. "Securing Cloud Data using RSA Algorithm." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 6, no. 4 (December 19, 2018): 96. http://dx.doi.org/10.3991/ijes.v6i4.9910.
Повний текст джерелаWibowo, Fitri, Muhammad Hasbi, and Yasir Arafat. "Integrasi Otentikasi Aplikasi Berbasis Web Menggunakan RADIUS (Studi Kasus: Website E-Learning Jurusan Teknik Elektro POLNEP)." Jurnal ELIT 1, no. 2 (September 21, 2020): 1–12. http://dx.doi.org/10.31573/elit.v1i2.51.
Повний текст джерелаMolina Zarca, Alejandro, Dan Garcia-Carrillo, Jorge Bernal Bernabe, Jordi Ortiz, Rafael Marin-Perez, and Antonio Skarmeta. "Enabling Virtual AAA Management in SDN-Based IoT Networks †." Sensors 19, no. 2 (January 12, 2019): 295. http://dx.doi.org/10.3390/s19020295.
Повний текст джерелаSingh, Shailesh Pratap, Nauman Bin Ali, and Lars Lundberg. "Smart and Adaptive Architecture for a Dedicated Internet of Things Network Comprised of Diverse Entities: A Proposal and Evaluation." Sensors 22, no. 8 (April 14, 2022): 3017. http://dx.doi.org/10.3390/s22083017.
Повний текст джерелаTurilli, Matteo, David Wallom, Chris Williams, Steve Gough, Neal Curran, Richard Tarrant, Dan Bretherton, et al. "Flexible services for the support of research." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 371, no. 1983 (January 28, 2013): 20120067. http://dx.doi.org/10.1098/rsta.2012.0067.
Повний текст джерелаB, Nanda Hajiani Putri. "WIFI Subscription Payment System Using NFC (Near Field Communication)." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 3, no. 2 (November 7, 2016): 60–66. http://dx.doi.org/10.33795/jartel.v3i2.222.
Повний текст джерелаStagni, Federico, Andrei Tsaregorodtsev, André Sailer, and Christophe Haen. "The DIRAC interware: current, upcoming and planned capabilities and technologies." EPJ Web of Conferences 245 (2020): 03035. http://dx.doi.org/10.1051/epjconf/202024503035.
Повний текст джерелаNeedleman, Mark. "The Shibboleth Authentication/Authorization System." Serials Review 30, no. 3 (January 2004): 252–53. http://dx.doi.org/10.1080/00987913.2004.10764917.
Повний текст джерелаB, Vinay Kumar. "Authorization and Authentication in Mobile Devices." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 1733–38. http://dx.doi.org/10.22214/ijraset.2022.41610.
Повний текст джерелаB, Vinay Kumar. "Authorization and Authentication in Mobile Devices." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 1739–44. http://dx.doi.org/10.22214/ijraset.2022.41611.
Повний текст джерелаAnugrah, Indra Gita, and Muhamad Aldi Rifai Imam Fakhruddin. "Development Authentication and Authorization Systems of Multi Information Systems Based REst API and Auth Token." INNOVATION RESEARCH JOURNAL 1, no. 2 (September 22, 2020): 127. http://dx.doi.org/10.30587/innovation.v1i2.1927.
Повний текст джерелаIstiaque Ahmed, Kazi, Mohammad Tahir, Mohamed Hadi Habaebi, Sian Lun Lau, and Abdul Ahad. "Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction." Sensors 21, no. 15 (July 28, 2021): 5122. http://dx.doi.org/10.3390/s21155122.
Повний текст джерелаEigeles, Dan. "Intelligent authentication, authorization, and administration (I3A)." Information Management & Computer Security 13, no. 5 (December 2005): 419–34. http://dx.doi.org/10.1108/09685220510627296.
Повний текст джерелаEigeles, Dan. "Intelligent authentication, authorization, and administration (I3A)." Information Management & Computer Security 14, no. 1 (January 2006): 5–23. http://dx.doi.org/10.1108/09685220610648346.
Повний текст джерелаMuszyński, Tomasz, and Grzegorz Koziel. "A security analysis of authentication and authorization implemented in web applications based on the REST architecture." Journal of Computer Sciences Institute 16 (September 30, 2020): 252–60. http://dx.doi.org/10.35784/jcsi.1925.
Повний текст джерелаMoon, Mahmuda Khan, Roksana Akter, and Rashed Mazumder. "A Study on Product Authentication and Authorization." International Journal of Computer Applications 183, no. 45 (December 22, 2021): 1–7. http://dx.doi.org/10.5120/ijca2021921844.
Повний текст джерелаCeccanti, A., M. Hardt, B. Wegh, AP Millar, M. Caberletti, E. Vianello, and S. Licehammer. "The INDIGO-Datacloud Authentication and Authorization Infrastructure." Journal of Physics: Conference Series 898 (October 2017): 102016. http://dx.doi.org/10.1088/1742-6596/898/10/102016.
Повний текст джерелаCorrado, Edward M. "Issues in E-resources Authentication and Authorization." Technical Services Quarterly 37, no. 3 (July 2, 2020): 302–14. http://dx.doi.org/10.1080/07317131.2020.1768704.
Повний текст джерелаGulati, Meena, Rakesh Kumar Yadav, and Gaurav Tewari. "Study of Trust Aggregation Authentication Protocol." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 11 (November 30, 2022): 191–96. http://dx.doi.org/10.17762/ijritcc.v10i11.5826.
Повний текст джерелаDeep, Gaurav, Jagpreet Sidhu, and Rajni Mohana. "Access Management of User and Cyber-Physical Device in DBaaS according to Indian IT Laws using Blockchain." Scalable Computing: Practice and Experience 21, no. 3 (August 1, 2020): 407–24. http://dx.doi.org/10.12694/scpe.v21i3.1737.
Повний текст джерелаShivanna, Preetha, and Sheela Samudrala Venkatesiah. "Secure Multimodal Authentication Scheme for Wireless Sensor Networks." International Journal of Safety and Security Engineering 11, no. 6 (December 28, 2021): 653–61. http://dx.doi.org/10.18280/ijsse.110605.
Повний текст джерелаBarabanov, Alexander, and Denis Makrushin. "Authentication and Authorization in Microservice-Based Systems: Survey of Architecture Patterns." Voprosy kiberbezopasnosti, no. 4(38) (2020): 32–43. http://dx.doi.org/10.21681/2311-3456-2020-04-32-43.
Повний текст джерелаGuo, Zhenyang, Yueyu Zhang, Jin Cao, Xiongpeng Ren, Xingwen Zhao, and Hui Li. "Secure Multifactor Authentication and Access Control Mechanism for Electronic Bill Service in a 5G Cloud-Fog Hybrid Architecture." Security and Communication Networks 2022 (May 12, 2022): 1–20. http://dx.doi.org/10.1155/2022/3658402.
Повний текст джерелаBangare, Pallavi Sunil, and Kishor P. Patil. "Study and Analysis of Various Authentication and Authorization for IoT Devices: A Challenging Overview." International Journal of Safety and Security Engineering 12, no. 2 (April 29, 2022): 209–16. http://dx.doi.org/10.18280/ijsse.120209.
Повний текст джерелаKhattri, Vipin, Sandeep Kumar Nayak, and Deepak Kumar Singh. "Plastic card circumvention an infirmity of authenticity and authorization." Journal of Financial Crime 27, no. 3 (May 8, 2020): 959–75. http://dx.doi.org/10.1108/jfc-03-2020-0034.
Повний текст джерелаGawannavar, Mahantesh, Payal Mandulkar, R. Thandeeswaran, and N. Jeyanthi. "Office in Cloud: Approach to Authentication and Authorization." Recent Advances in Communications and Networking Technology 4, no. 1 (November 18, 2015): 49–55. http://dx.doi.org/10.2174/2215081104666150828234320.
Повний текст джерелаAl-Refai, Hasan, and Ali Ahmad Alawneh. "User Authentication and Authorization Framework in IoT Protocols." Computers 11, no. 10 (September 27, 2022): 147. http://dx.doi.org/10.3390/computers11100147.
Повний текст джерелаCastro, R., D. R. López, and J. Vega. "An authentication and authorization infrastructure: The PAPI system." Fusion Engineering and Design 81, no. 15-17 (July 2006): 2057–61. http://dx.doi.org/10.1016/j.fusengdes.2006.04.044.
Повний текст джерелаLopez, Javier, Rolf Oppliger, and Günther Pernul. "Authentication and authorization infrastructures (AAIs): a comparative survey." Computers & Security 23, no. 7 (October 2004): 578–90. http://dx.doi.org/10.1016/j.cose.2004.06.013.
Повний текст джерелаForné, Jordi, Francisca Hinarejos, Andrés Marín, Florina Almenárez, Javier Lopez, Jose A. Montenegro, Marc Lacoste, and Daniel Díaz. "Pervasive authentication and authorization infrastructures for mobile users." Computers & Security 29, no. 4 (June 2010): 501–14. http://dx.doi.org/10.1016/j.cose.2009.09.001.
Повний текст джерела