Showing 1 - 20 results of 121 for search '"access control"', query time: 0.11s Refine Results
  1. 1

    Access control in open distributed systems by Udzir, Nur Izura, Wood, Alan, Muda, Zaiton, Dehghantanha, Ali, Abdullah @ Selimun, Mohd Taufik, Abdullah, Azizol

    Published 2012
    “…In this paper, we discuss two conventional access control mechanisms-access control lists and capabilities-which can be incorporated in the Linda·model, and their suitability and implications on the flexibility of the model.…”
    Get full text
    Conference or Workshop Item
  2. 2

    A study on physical access control using QR code as virtual identification system for door access control by Rajangeran, Ashvini Priya, Sandra Sekaran, Puvanah, Sidi, Fatimah, Hairani, Saiful Ramadzan, Daud, Mohd Faizal, Razak, Rizal

    Published 2019
    “…The system develops a centralized door access control management system which is used to store the time stamp of students and staff, and introduces an IoT-based door access control system using the QR code of PutraVID.…”
    Get full text
    Conference or Workshop Item
  3. 3

    Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments by Teo, Poh Kuang, Ibrahim, Hamidah, Udzir, Nur Izura, Sidi, Fatimah

    Published 2011
    “…Though eXtensible Access Control Markup Language (XACML) has a powerful capacity of expression, it does not support all the elements character of RBAC. …”
    Get full text
    Article
  4. 4

    An adaptive energy efficient protocol in media access control by Abduljaleel, Uday, Akbari, Ayyoub, Khatun, Sabira

    Published 2009
    “…In this paper, we propose a novel pe-frame based TPC protocol, an Adaptive Energy efficient protocol in Media Access Control (AE-MAC), in ad-hoc networks using IEEE 802.11 at low PHY rate. …”
    Conference or Workshop Item
  5. 5

    TC-enabled and distributed cloud computing access control model by Halboob, Waleed, Mahmod, Ramlan, Alghathbar, Khaled S., Mamat, Ali

    Published 2014
    “…Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trust between users, service provider and provided services in a scalable manner. …”
    Article
  6. 6

    Temporal, delegable and cheap update access control to published XML documents. by Halboob, Waleed, Mamat, Ali, Mahmod, Ramlan, Khan, Muhammad Khurram

    Published 2013
    “…Providing access control for published XML documents on the Web is an important topic. …”
    Get full text
    Article
  7. 7

    Trusted-based scalable access control model for broadcast XML documents. by Halboob, Waleed, Mamat, Ali, Mahmod, Ramlan, Alghathbar, Khaled S., Khan, Muhammad Khurram

    Published 2013
    “…XML language is becoming a de facto standard for representing and transmitting data on the web so controlling access to XML documents is an important issue. Several XML access control approaches have been proposed to control the access of the published XML documents but these approaches still cannot scale well wim increased system and management workload because they specify and enforce their access control policies in centralized servers. …”
    Get full text
    Article
  8. 8

    Aspect oriented approach to improvement role based access control systems by Hazaa, Muneer A., Abd Ghani, Abdul Azim, Mamat, Ali, Ibrahim, Hamidah

    Published 2009
    “…As a case study, we present an aspect-oriented design framework for CORBA Access Control subsystem that supports different role-based access control models.…”
    Get full text
    Conference or Workshop Item
  9. 9

    Push-based XML access control policy languages: a review by Halboob, Waleed Abduljabbar Mohammed, Mamat, Ali, Mahmod, Ramlan

    Published 2014
    “…Several access control policy languages have been proposed for specifying access control policies for push-based XML access control systems. …”
    Get full text
    Conference or Workshop Item
  10. 10

    Role performance trust-based access control for protecting sensitive attributes by Salji, Mohd Rafiz, Udzir, Nur Izura, Ninggal, Mohd Izuan Hafez, Mohd Sani, Nor Fazlida, Ibrahim, Hamidah

    Published 2016
    “…Preserving privacy is a challenge and requires the management of access control, which may be based on role, purpose or trust. …”
    Get full text
    Article
  11. 11
  12. 12

    Energy-efficient medium access control strategy for cooperative wireless networks by Sami, Mahmoud

    Published 2016
    “…Furthermore, the proposed optimal power allocation enhances EAP-CMAC performance in terms of network lifetime by 7% compared to equal power allocation.Moreover in this study a cooperative Medium Access Control (MAC) protocol, called Cooperative Cognitive TDMA (CC-TDMA), is proposed for cognitive networks. …”
    Get full text
    Thesis
  13. 13

    Performance and divisional trust and purpose-based access control for privacy preservation by Salji, Mohd Rafiz, Udzir, Nur Izura, Hafez Ninggal, Mohd Izuan, Mohd Sani, Nor Fazlida, Ibrahim, Hamidah

    Published 2018
    “…To keep the privacy safe from inappropriate use, one of the most popular methods that can be used is the access control. Currently, many augmentation of access control models has been developed to improve the effectiveness in preserving the privacy. …”
    Get full text
    Article
  14. 14

    Trust, purpose, and role-based access control model for privacy protection by Salji, Mohd Rafiz, Udzir, Nur Izura, Ninggal, Mohd Izuan Hafez, Mohd Sani, Nor Fazlida, Ibrahim, Hamidah

    Published 2019
    “…Role-based access control model has been proposed to protect customer's data. …”
    Get full text
    Conference or Workshop Item
  15. 15

    Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks by Nordin, Noorsalwati

    Published 2007
    Subjects: “…Wireless sensor networks - Access control.…”
    Get full text
    Thesis
  16. 16
  17. 17

    Trust-based access control model with quantification method for protecting sensitive attributes by Salji, Mohd Rafiz, Udzir, Nur Izura, Hafez Ninggal, Mohd Izuan, Mohd Sani, Nor Fazlida, Ibrahim, Hamidah

    Published 2022
    “…Despite the recent advances in access control frameworks and models, there are still issues that hinder the implementation of successful access control. …”
    Article
  18. 18

    Secure role based access control systems using aspect-orientation designing by Hazaa, Muneer A., Abd Ghani, Abdul Azim, Mamat, Ali, Ibrahim, Hamidah

    Published 2009
    “…Using role-based access control (RBAC) as an example, currently it supports role hierarchy, static separation of duty relations, and dynamic separation of duty relations. …”
    Get full text
    Conference or Workshop Item
  19. 19

    A distributed push-based XML access control model for better scalability by Halboob, Waleed Abduljabbar Mohammed, Mamat, Ali, Mahmod, Ramlan

    Published 2008
    “…XML access control is a non-trivial topic as XML language becomes a standard for data representation and transmission on the Web. …”
    Get full text
    Conference or Workshop Item
  20. 20

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…In fact, there is a need for fine-grained access control techniques which limit access of specific individuals to resources. …”
    Get full text
    Thesis