Добірка наукової літератури з теми "Time based access control"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Time based access control".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Time based access control"
Han, Chun Yan, Lian Zhong Liu, and Yi Fei Yuan. "Time Constraints of Access Control." Applied Mechanics and Materials 602-605 (August 2014): 3791–95. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3791.
Повний текст джерелаLiu, Chaoqun, Zhen Peng, and Lili Wu. "Role of Time-Domain Based Access Control Model." Journal of Software Engineering and Applications 09, no. 02 (2016): 57–62. http://dx.doi.org/10.4236/jsea.2016.92004.
Повний текст джерелаSuchendra, Devie Ryana, Dewi Putri Suryani, and Muhammad Ikhsan Sani. "Home Lighting Control Based on Time Scheduling using Crontab." IJAIT (International Journal of Applied Information Technology) 2, no. 01 (May 25, 2018): 1. http://dx.doi.org/10.25124/ijait.v2i01.924.
Повний текст джерелаMa, Haifeng, and Yangmin Li. "Multi-Power Reaching Law Based Discrete-Time Sliding-Mode Control." IEEE Access 7 (2019): 49822–29. http://dx.doi.org/10.1109/access.2019.2904103.
Повний текст джерелаZhang, Lili, Qi Zhao, Li Wang, and Lingyu Zhang. "Urban Intersection Signal Control Based on Time-Space Resource Scheduling." IEEE Access 9 (2021): 49281–91. http://dx.doi.org/10.1109/access.2021.3059496.
Повний текст джерелаDanilescu, Marcel, and Victor Besliu. "TRUST- BASED MODELING MAC-TYPE ACCESS CONTROL THROUGH ACCESS AND ACTIONS CONTROL POLICIES." Journal of Engineering Science XXVIII, no. 2 (June 2021): 67–78. http://dx.doi.org/10.52326/jes.utm.2021.28(2).05.
Повний текст джерелаLuo, Yiping, and Junling Zhu. "Finite-Time Average Consensus Control of Multi-Agent Systems Based on the Aperiodically Intermittent Control." IEEE Access 10 (2022): 14959–68. http://dx.doi.org/10.1109/access.2022.3149278.
Повний текст джерелаDuan, Gui-Jiang, and Xin Yan. "A Real-Time Quality Control System Based on Manufacturing Process Data." IEEE Access 8 (2020): 208506–17. http://dx.doi.org/10.1109/access.2020.3038394.
Повний текст джерелаGuo, Jie, Zhanshan Zhao, Fengdong Shi, Ruikun Wang, and Shasha Li. "Observer-Based Synchronization Control for Coronary Artery Time-Delay Chaotic System." IEEE Access 7 (2019): 51222–35. http://dx.doi.org/10.1109/access.2019.2909749.
Повний текст джерелаAznar-Poveda, Juan, Esteban Egea-Lopez, Antonio-Javier Garcia-Sanchez, and Pablo Pavon-Marino. "Time-to-Collision-Based Awareness and Congestion Control for Vehicular Communications." IEEE Access 7 (2019): 154192–208. http://dx.doi.org/10.1109/access.2019.2949131.
Повний текст джерелаДисертації з теми "Time based access control"
Jaggi, Felix P. "An access control model based on time and events." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28945.
Повний текст джерелаScience, Faculty of
Computer Science, Department of
Graduate
Alsarhani, Sami. "Reasoning about history based access control policy using past time operators of interval temporal logic." Thesis, De Montfort University, 2014. http://hdl.handle.net/2086/10406.
Повний текст джерелаKnight, G. S. "Scenario-based access control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.
Повний текст джерелаAktoudianakis, Evangelos. "Relationship based access control." Thesis, University of Surrey, 2016. http://epubs.surrey.ac.uk/809642/.
Повний текст джерелаMagnussen, Gaute, and Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.
Повний текст джерелаRole based access control (RBAC) is widely used in health care systems today. Some of the biggest systems in use at Norwegian hospitals utilizes role based integration. The basic concept of RBAC is that users are assigned to roles, permissions are assigned to roles and users acquire permissions by being members of roles. An alternative approach to the role based access distribution, is that information should be available only to those who are taking active part in a patients treatment. This approach is called decision based access control (DBAC). While some RBAC implementations grant access to a groups of people by ward, DBAC ensures that access to relevant parts of the patients medical record is given for treatment purposes regardless of which department the health care worker belongs to. Until now the granularity which the legal framework describes has been difficult to follow. The practical approach has been to grant access to entire wards or organizational units in which the patient currently resides. Due to the protection of personal privacy, it is not acceptable that any medical record is available to every clinician at all times. The most important reason to implement DBAC where RBAC exists today, is to get an access control model that is more dynamic. The users should have the access they need to perform their job at all times, but not more access than needed. With RBAC, practice has shown that it is very hard to make dynamic access rules when properties such as time and tasks of an employees work change. This study reveals that pretty much all security measures in the RBAC systems can be overridden by the use of emergency access features. These features are used extensively in everyday work at the hospitals, and thereby creates a security risk. At the same time conformance with the legal framework is not maintained. Two scenarios are simulated in a fictional RBAC and DBAC environment in this report. The results of the simulation show that a complete audit of the logs containing access right enhancements in the RBAC environment is unfeasible at a large hospital, and even checking a few percent of the entries is also a very large job. Changing from RBAC to DBAC would probably affect this situation to the better. Some economical advantages are also pointed out. If a change is made, a considerable amount of time that is used by health care workers to unblock access to information they need in their everyday work will be saved.
Klöck, Clemens. "Auction-based Medium Access Control." [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000007323.
Повний текст джерелаMacfie, Alex. "Semantic role-based access control." Thesis, University of Westminster, 2014. https://westminsterresearch.westminster.ac.uk/item/964y2/semantic-role-based-access-control.
Повний текст джерелаBelokosztolszki, András. "Role-based access control policy administration." Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.615798.
Повний текст джерелаPang, Kenneth K. (Kenneth Kwok Kit) 1976. "Fine-grained event-based access control." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47532.
Повний текст джерелаIncludes bibliographical references (leaf 46).
by Kenneth K. Pang.
B.S.
M.Eng.
Montrieux, Lionel. "Model-based analysis of role-based access control." Thesis, Open University, 2013. http://oro.open.ac.uk/38672/.
Повний текст джерелаКниги з теми "Time based access control"
Zhang, Rui. Relation based access control. Heidelberg: AKA, 2010.
Знайти повний текст джерелаFerraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.
Знайти повний текст джерелаFerraiolo, David. Role-based access controls. Boston: Artech House, 2003.
Знайти повний текст джерелаYuen, Clement. Rate control with pricing in contention-based access networks. Ottawa: National Library of Canada, 2002.
Знайти повний текст джерелаKogan, Konstantin, and Eugene Khmelnitsky. Scheduling: Control-Based Theory and Polynomial-Time Algorithms. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4675-7.
Повний текст джерелаKogan, Konstantin. Scheduling: Control-based theory and polynomial-time algorithms. Dordrecht: Kluwer Academic Publishers, 2000.
Знайти повний текст джерелаHendrick, Thomas E. Purchasing's contributions to time-based strategies. Tempe, Ariz: Center for Advanced Purchasing Studies, 1994.
Знайти повний текст джерелаLarson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Знайти повний текст джерелаLarson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Знайти повний текст джерелаLarson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Знайти повний текст джерелаЧастини книг з теми "Time based access control"
Limkar, Suresh, Nivedita Kadam, and Rakesh Kumar Jha. "Access Control Based on Location and Time." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 102–7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32573-1_16.
Повний текст джерелаChiang, Chia-Chu, and Coskun Bayrak. "Concurrency and Time in Role-Based Access Control." In Advances in Information Security and Its Application, 37–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02633-1_5.
Повний текст джерелаZou, Lei, Zidong Wang, and Jinling Liang. "Recursive Filtering for Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems, 107–25. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_6.
Повний текст джерелаZou, Lei, Zidong Wang, and Jinling Liang. "Observer-Based $${\mathscr {H}}_{\infty }$$ Control of Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems, 149–67. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_8.
Повний текст джерелаZou, Lei, Zidong Wang, and Jinling Liang. "Finite-Horizon $${\mathscr {H}}_{\infty }$$ Fault Estimation of Time-Varying Systems with Random Access Protocol." In Communication-Protocol-Based Filtering and Control of Networked Systems, 71–85. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97512-8_4.
Повний текст джерелаYuan, Zhiyong, Changcheng Zhou, Yiqing Lian, Qingshan Xu, and Siyu Tao. "Multi-point Access Decentralized Wind Power Time Series Model Based on MCMC Algorithm and Hierarchical Clustering Algorithm." In Proceedings of PURPLE MOUNTAIN FORUM 2019-International Forum on Smart Grid Protection and Control, 389–400. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9783-7_31.
Повний текст джерелаZhang, Jiawei, Yanbo Yang, Ning Lu, Zhiwei Liu, and Jianfeng Ma. "A Privacy-Aware and Time-Limited Data Access Control Scheme with Large Universe and Public Traceability for Cloud-Based IoD." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 103–16. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96791-8_8.
Повний текст джерелаJyothi, E. V. N., V. Purna Chandra Rao, and B. Rajani. "Study on Recent Method of Dynamic Time-Based Encryption (DTBE) and Searchable Access Control Scheme for Personal Health Record in Cloud Computing." In Cybernetics, Cognition and Machine Learning Applications, 289–93. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_28.
Повний текст джерелаZhao, Yujuan, Baojiang Cui, and Jie Xu. "A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain." In Communications in Computer and Information Science, 27–36. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9229-1_2.
Повний текст джерелаJyothi, E. V. N., V. Purna Chandra Rao, and B. Rajani. "Correction to: Study on Recent Method of Dynamic Time-Based Encryption (DTBE) and Searchable Access Control Scheme for Personal Health Record in Cloud Computing." In Cybernetics, Cognition and Machine Learning Applications, C1. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-1632-0_33.
Повний текст джерелаТези доповідей конференцій з теми "Time based access control"
Leahu, Marius, Marc Dobson, and Giuseppe Avolio. "Role Based Access Control in the ATLAS Experiment." In 2007 15th IEEE-NPSS Real-Time Conference. IEEE, 2007. http://dx.doi.org/10.1109/rtc.2007.4382738.
Повний текст джерелаBertolissi, Clara, and Maribel Fernandez. "Time and Location Based Services with Access Control." In 2008 New Technologies, Mobility and Security (NTMS). IEEE, 2008. http://dx.doi.org/10.1109/ntms.2008.ecp.98.
Повний текст джерелаGuang-liang Liu, Xin-you Li, Sheng-xian Xie, Hong-bin Luo, Jun-qing Li, and Yu-ting Wang. "Multi-granularity time-constraint Role-based access control." In 2008 IEEE International Symposium on IT in Medicine and Education (ITME). IEEE, 2008. http://dx.doi.org/10.1109/itme.2008.4744025.
Повний текст джерела"Real Time Access Control Based on Face Recognition." In International Academy of Engineers. International Academy of Engineers, 2015. http://dx.doi.org/10.15242/iae.iae0615004.
Повний текст джерелаHung, Le Xuan, Sungyoung Lee, Young-Koo Lee, and Heejo Lee. "Activity-based Access Control Model to Hospital Information." In 2007 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications. IEEE, 2007. http://dx.doi.org/10.1109/rtcsa.2007.18.
Повний текст джерелаRamanathan, Narayanan, Allison Beach, Robert Hastings, Weihong Yin, Sima Taheri, Paul Brewer, Dana Eubanks, et al. "Virtual Inductive Loop: Real time video analytics for vehicular access control." In 2021 17th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, 2021. http://dx.doi.org/10.1109/avss52988.2021.9663748.
Повний текст джерелаLiu, Zhenghong, Yuhong Jia, and Tieli Sun. "Study on Role-Based Access Control with Time Constraint." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.232.
Повний текст джерелаKim, Hyoseung, Pratyush Patel, Shige Wang, and Ragunathan Raj Rajkumar. "A server-based approach for predictable GPU access control." In 2017 IEEE 23rd International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). IEEE, 2017. http://dx.doi.org/10.1109/rtcsa.2017.8046309.
Повний текст джерелаSodiya, Adesina, and Adebukola Onashoga. "Components- Based Access Control Architecture." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3374.
Повний текст джерелаBlower, Andrew, and Gerald Kotonya. "RECON: A Real-time Entity Based Access Control for IoT." In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). IEEE, 2019. http://dx.doi.org/10.1109/iotsms48152.2019.8939218.
Повний текст джерелаЗвіти організацій з теми "Time based access control"
Bobashev, Georgiy, John Holloway, Eric Solano, and Boris Gutkin. A Control Theory Model of Smoking. RTI Press, June 2017. http://dx.doi.org/10.3768/rtipress.2017.op.0040.1706.
Повний текст джерелаJansen, W. A. A revised model for role-based access control. Gaithersburg, MD: National Institute of Standards and Technology, 1998. http://dx.doi.org/10.6028/nist.ir.6192.
Повний текст джерелаVan de Sompel, H., M. Nelson, and R. Sanderson. HTTP Framework for Time-Based Access to Resource States -- Memento. RFC Editor, December 2013. http://dx.doi.org/10.17487/rfc7089.
Повний текст джерелаChandramouli, Ramaswamy, Zack Butcher, and Aradhna Chetal. Attribute-based Access Control for Microservices-based Applications Using a Service Mesh. National Institute of Standards and Technology, August 2021. http://dx.doi.org/10.6028/nist.sp.800-204b.
Повний текст джерелаFreudenthal, Eric, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti. DRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada440599.
Повний текст джерелаHu, Vincent C., David Ferraiolo, Rick Kuhn, Adam Schnitzer, Kenneth Sandlin, Robert Miller, and Karen Scarfone. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. National Institute of Standards and Technology, January 2014. http://dx.doi.org/10.6028/nist.sp.800-162.
Повний текст джерелаYan, Lok K. Hardware Based Function Level Mandatory Access Control for Memory Structures. Fort Belvoir, VA: Defense Technical Information Center, April 2008. http://dx.doi.org/10.21236/ada481104.
Повний текст джерелаKlasky, Hilda B., Sashi Tadinada, Paul T. Williams, and Bennett Richard Bass. A Role-Based Access Control (RBAC) Schema for REAP Web App. Office of Scientific and Technical Information (OSTI), September 2013. http://dx.doi.org/10.2172/1093096.
Повний текст джерелаHengartner, Urs, and Peter Steenkiste. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Fort Belvoir, VA: Defense Technical Information Center, October 2004. http://dx.doi.org/10.21236/ada457869.
Повний текст джерелаWijnen, B., R. Presuhn, and K. McCloghrie. View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP). RFC Editor, December 2002. http://dx.doi.org/10.17487/rfc3415.
Повний текст джерела