Статті в журналах з теми "Data access control policies"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Data access control policies".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Jain, Taniya. "Secure Big Data Access Control Policies for Cloud Computing Environment." International Journal of Innovative Research in Computer Science & Technology 5, no. 2 (March 31, 2017): 253–56. http://dx.doi.org/10.21276/ijircst.2017.5.2.8.
Повний текст джерелаBouganim, Luc, Francois Dang Ngoc, and Philippe Pucheral. "Dynamic access-control policies on XML encrypted data." ACM Transactions on Information and System Security 10, no. 4 (January 2008): 1–37. http://dx.doi.org/10.1145/1284680.1284684.
Повний текст джерелаBrewster, Christopher, Barry Nouwt, Stephan Raaijmakers, and Jack Verhoosel. "Ontology-based Access Control for FAIR Data." Data Intelligence 2, no. 1-2 (January 2020): 66–77. http://dx.doi.org/10.1162/dint_a_00029.
Повний текст джерелаAziz, Benjamin. "Towards open data-driven evaluation of access control policies." Computer Standards & Interfaces 56 (February 2018): 13–26. http://dx.doi.org/10.1016/j.csi.2017.09.001.
Повний текст джерелаYaokumah, Winfred. "Modelling the Impact of Administrative Access Controls on Technical Access Control Measures." Information Resources Management Journal 30, no. 4 (October 2017): 53–70. http://dx.doi.org/10.4018/irmj.2017100104.
Повний текст джерелаPervez, Zeeshan, Asad Masood Khattak, Sungyoung Lee, Young-Koo Lee, and Eui-Nam Huh. "Oblivious access control policies for cloud based data sharing systems." Computing 94, no. 12 (August 21, 2012): 915–38. http://dx.doi.org/10.1007/s00607-012-0206-z.
Повний текст джерелаVenkatesan, G., and K. Ambika. "Indexing Policies in Cloud Information Accountability for Data Sharing." Asian Journal of Computer Science and Technology 2, no. 1 (May 5, 2013): 22–27. http://dx.doi.org/10.51983/ajcst-2013.2.1.1712.
Повний текст джерелаLiu, Gang, Guofang Zhang, Quan Wang, Shaomin Ji, and Lizhi Zhang. "Fine-grained access control method for private data in android system." International Journal of Distributed Sensor Networks 15, no. 3 (March 2019): 155014771984023. http://dx.doi.org/10.1177/1550147719840232.
Повний текст джерелаSabitha, S., and M. S. Rajasree. "Access control based privacy preserving secure data sharing with hidden access policies in cloud." Journal of Systems Architecture 75 (April 2017): 50–58. http://dx.doi.org/10.1016/j.sysarc.2017.03.002.
Повний текст джерелаGuo, Jinyi, Wei Ren, Yi Ren, and Tianqin Zhu. "A Watermark-Based in-Situ Access Control Model for Image Big Data." Future Internet 10, no. 8 (July 29, 2018): 69. http://dx.doi.org/10.3390/fi10080069.
Повний текст джерелаArunajyothi, G. "Key based Access Control Policies to Solve Security in Cloud Data Sharing." International Journal of Emerging Research in Management and Technology 6, no. 12 (June 11, 2018): 45. http://dx.doi.org/10.23956/ijermt.v6i12.33.
Повний текст джерелаMuppavarapu, Vineela, and Soon M. Chung. "Semantic-Based Access Control for Data Resources in Open Grid Services Architecture." International Journal of Grid and High Performance Computing 6, no. 2 (April 2014): 1–23. http://dx.doi.org/10.4018/ijghpc.2014040101.
Повний текст джерелаMeneka, M., and K. Meenakshisundaram. "An Enhancement Role and Attribute Based Access Control Mechanism in Big Data." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 3187. http://dx.doi.org/10.11591/ijece.v8i5.pp3187-3193.
Повний текст джерелаLakaraju, Sandeep, Dianxiang Xu, and Yong Wang. "Analysis of Healthcare Workflows in Accordance with Access Control Policies." International Journal of Healthcare Information Systems and Informatics 11, no. 1 (January 2016): 1–20. http://dx.doi.org/10.4018/ijhisi.2016010101.
Повний текст джерелаKuts, D. V., and S. V. Porshnev. "THE FEATURES OF MANDATORY ACCESS CONTROL MODEL IN MODERN UNAUTHORIZED ACCESS DATA PROTECTION TOOLS." Journal of the Ural Federal District. Information security 20, no. 3 (2020): 27–33. http://dx.doi.org/10.14529/secur200303.
Повний текст джерелаLi, Jian, and William K. Cheung. "Access Control on Semantic Web Data Using Query Rewriting." International Journal of Organizational and Collective Intelligence 1, no. 2 (April 2010): 46–66. http://dx.doi.org/10.4018/joci.2010040103.
Повний текст джерелаShirsath, Rakesh, and Dr K. V. Daya Sagar. "A Review of fine grained access control techniques." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 20. http://dx.doi.org/10.14419/ijet.v7i2.7.10249.
Повний текст джерелаHuang, Jie, and Dehua Wu. "Access Control Model Scheme based on Policy Grading in Natural Language Processing Blockchain Environment." Mobile Information Systems 2022 (August 8, 2022): 1–9. http://dx.doi.org/10.1155/2022/4365944.
Повний текст джерелаTrojer, Thomas, Basel Katt, Ruth Breu, Thomas Schabetsberger, and Richard Mair. "Managing Privacy and Effectiveness of Patient-Administered Authorization Policies." International Journal of Computational Models and Algorithms in Medicine 3, no. 2 (April 2012): 43–62. http://dx.doi.org/10.4018/jcmam.2012040103.
Повний текст джерелаSeifermann, Stephan, Robert Heinrich, Dominik Werle, and Ralf Reussner. "Detecting violations of access control and information flow policies in data flow diagrams." Journal of Systems and Software 184 (February 2022): 111138. http://dx.doi.org/10.1016/j.jss.2021.111138.
Повний текст джерелаTang, Xiao Yong, Jin Wei Li, and Gui Ping Liao. "A Trust-Aware Access Control Policy for Cloud Data Protection." Applied Mechanics and Materials 411-414 (September 2013): 40–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.40.
Повний текст джерелаZhang, Jian, Jin Yao, and Kun Huang. "Research on Access Control Policy for Confidential Information System." Applied Mechanics and Materials 263-266 (December 2012): 3064–67. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3064.
Повний текст джерелаLi, Teng, Jiawei Zhang, Yanbo Yang, Wei Qiao, and Yangxu Lin. "Auditable and Times limitable Secure Data Access Control for Cloud-based Industrial Internet of Things." Journal of Networking and Network Applications 1, no. 3 (2021): 129–38. http://dx.doi.org/10.33969/j-nana.2021.010306.
Повний текст джерелаZheng, Kaifa, Caiyang Ding, and Jinchen Wang. "A Secure Data-Sharing Scheme for Privacy-Preserving Supporting Node–Edge–Cloud Collaborative Computation." Electronics 12, no. 12 (June 19, 2023): 2737. http://dx.doi.org/10.3390/electronics12122737.
Повний текст джерелаAlattab, Ahmed Abdu, Reyazur Rashid Irshad, Anwar Ali Yahya, and Amin A. Al-Awady. "Privacy Protected Preservation of Electric Vehicles’ Data in Cloud Computing Using Secure Data Access Control." Energies 15, no. 21 (October 31, 2022): 8085. http://dx.doi.org/10.3390/en15218085.
Повний текст джерелаEmad F. Khalaf, Emad F. Khalaf. "A Survey of Access Control and Data Encryption for Database Security." journal of King Abdulaziz University Engineering Sciences 28, no. 1 (January 4, 2017): 19–30. http://dx.doi.org/10.4197/eng.28-1.2.
Повний текст джерелаIyer, Padmavathi, and Amirreza Masoumzadeh. "Learning Relationship-Based Access Control Policies from Black-Box Systems." ACM Transactions on Privacy and Security 25, no. 3 (August 31, 2022): 1–36. http://dx.doi.org/10.1145/3517121.
Повний текст джерелаDemurjian, Steven A., Eugene Sanzi, Thomas P. Agresta, and William A. Yasnoff. "Multi-Level Security in Healthcare Using a Lattice-Based Access Control Model." International Journal of Privacy and Health Information Management 7, no. 1 (January 2019): 80–102. http://dx.doi.org/10.4018/ijphim.2019010105.
Повний текст джерелаLI, Xinlong. "A Blockchain-Based Verifiable User Data Access Control Policy for Secured Cloud Data Storage." Computational Intelligence and Neuroscience 2022 (April 27, 2022): 1–12. http://dx.doi.org/10.1155/2022/2254411.
Повний текст джерелаTalha, Mohamed, and Anas Abou El Kalam. "Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms." JUCS - Journal of Universal Computer Science 27, no. 12 (December 28, 2021): 1300–1324. http://dx.doi.org/10.3897/jucs.77046.
Повний текст джерелаKomal, Unnati. "Data Leakage Detection using Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 3129–32. http://dx.doi.org/10.22214/ijraset.2023.52273.
Повний текст джерелаDai, Chang Ying, Wen Tao Gong, and Jing Liu. "Access Process of Data-Flow in Cross-Domain Usage Control Model Based on XACML." Advanced Materials Research 143-144 (October 2010): 1275–79. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.1275.
Повний текст джерелаHaguouche, Samira, and Zahi Jarir. "Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism." Security and Communication Networks 2018 (October 21, 2018): 1–13. http://dx.doi.org/10.1155/2018/1572812.
Повний текст джерелаPatil, Suraj Krishna, Sandipkumar Chandrakant Sagare, and Alankar Shantaram Shelar. "Use of Purpose and Role Based Access Control Mechanisms to Protect Data Within RDBMS." International Journal of Software Innovation 8, no. 1 (January 2020): 82–91. http://dx.doi.org/10.4018/ijsi.2020010105.
Повний текст джерелаHuang, Yi, Xin Qiang Ma, Dan Ning Li, and Rong Wu. "Research and Applications of Access Control Based on Logic SQL Database System." Advanced Materials Research 143-144 (October 2010): 672–76. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.672.
Повний текст джерелаXiong, An Ping, and Xin Xin He. "Multiple Access Control Struction for Cloud with Ciphertext." Applied Mechanics and Materials 556-562 (May 2014): 5888–92. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5888.
Повний текст джерелаZhong, Ting, You Peng Sun, and Qiao Liu. "Fine-Grained Access Control with Efficient Revocation in Cloud Storage." Applied Mechanics and Materials 571-572 (June 2014): 79–89. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.79.
Повний текст джерелаTruong, Hien, José L. Hernández-Ramos, Juan A. Martinez, Jorge Bernal Bernabe, Wenting Li, Agustin Marin Frutos, and Antonio Skarmeta. "Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts." Security and Communication Networks 2022 (June 2, 2022): 1–14. http://dx.doi.org/10.1155/2022/1828747.
Повний текст джерелаPereira, Óscar Mortágua, Diogo Domingues Regateiro, and Rui L. Aguiar. "Secure, Dynamic and Distributed Access Control Stack for Database Applications." International Journal of Software Engineering and Knowledge Engineering 25, no. 09n10 (November 2015): 1703–8. http://dx.doi.org/10.1142/s0218194015710035.
Повний текст джерелаKaushik, Shweta, and Charu Gandhi. "Fine Grained Decentralized Access Control With Provable Data Transmission and User Revocation in Cloud." International Journal of Information Security and Privacy 15, no. 2 (April 2021): 29–52. http://dx.doi.org/10.4018/ijisp.2021040102.
Повний текст джерелаShen, Xieyang, Chuanhe Huang, Danxin Wang, and Jiaoli Shi. "A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart Cities." Wireless Communications and Mobile Computing 2021 (October 8, 2021): 1–15. http://dx.doi.org/10.1155/2021/6686675.
Повний текст джерелаHelil, Nurmamat, and Kaysar Rahman. "CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/2713595.
Повний текст джерелаStojanov, Riste, Vladimir Zdraveski, and Dimitar Trajanov. "Challenges and Opportunities in Applying Semantics to Improve Access Control in the Field of Internet of Things." Electronics ETF 21, no. 2 (August 8, 2018): 66. http://dx.doi.org/10.7251/els1721066s.
Повний текст джерелаZhang, Duo, Shangping Wang, Yinglong Zhang, Qian Zhang, and Yaling Zhang. "A Secure and Privacy-Preserving Medical Data Sharing via Consortium Blockchain." Security and Communication Networks 2022 (May 18, 2022): 1–15. http://dx.doi.org/10.1155/2022/2759787.
Повний текст джерелаIbraimi, Luan, Qiang Tang, Pieter Hartel, and Willem Jonker. "Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records." International Journal of Computational Models and Algorithms in Medicine 1, no. 2 (April 2010): 1–21. http://dx.doi.org/10.4018/jcmam.2010040101.
Повний текст джерелаSzabó, Zoltán, and Vilmos Bilicki. "Access Control of EHR Records in a Heterogeneous Cloud Infrastructure." Acta Cybernetica 25, no. 2 (December 7, 2021): 485–516. http://dx.doi.org/10.14232/actacyb.290283.
Повний текст джерелаКраснов, С. А., А. А. Нечай, and О. Н. Бамбурова. "An approach to declining access in information systems based on intellectual data analysis." Vestnik of Russian New University. Series «Complex systems: models, analysis, management», no. 4 (January 10, 2022): 95–105. http://dx.doi.org/10.18137/rnu.v9187.21.04.p.095.
Повний текст джерелаNagasubramanian, Gayathri, Rakesh kumar Sakthivel, and Fadi Al-Turjman. "Secure and Consistent Job Administration Using Encrypted Data Access Policies in Cloud Systems." Computers & Electrical Engineering 96 (December 2021): 107520. http://dx.doi.org/10.1016/j.compeleceng.2021.107520.
Повний текст джерелаLiu, Xueyan, Yukun Luo, and Xiaotao Yang. "Traceable Attribute-Based Secure Data Sharing with Hidden Policies in Mobile Health Networks." Mobile Information Systems 2020 (August 3, 2020): 1–12. http://dx.doi.org/10.1155/2020/3984048.
Повний текст джерелаLiu, Meiping, Cheng Yang, Hao Li, and Yana Zhang. "An Efficient Attribute-Based Access Control (ABAC) Policy Retrieval Method Based on Attribute and Value Levels in Multimedia Networks." Sensors 20, no. 6 (March 20, 2020): 1741. http://dx.doi.org/10.3390/s20061741.
Повний текст джерела