-
1
Access control in open distributed systems
Published 2012“…In this paper, we discuss two conventional access control mechanisms-access control lists and capabilities-which can be incorporated in the Linda·model, and their suitability and implications on the flexibility of the model.…”
Get full text
Conference or Workshop Item -
2
A study on physical access control using QR code as virtual identification system for door access control
Published 2019“…The system develops a centralized door access control management system which is used to store the time stamp of students and staff, and introduces an IoT-based door access control system using the QR code of PutraVID.…”
Get full text
Conference or Workshop Item -
3
Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments
Published 2011“…Though eXtensible Access Control Markup Language (XACML) has a powerful capacity of expression, it does not support all the elements character of RBAC. …”
Get full text
Article -
4
An adaptive energy efficient protocol in media access control
Published 2009“…In this paper, we propose a novel pe-frame based TPC protocol, an Adaptive Energy efficient protocol in Media Access Control (AE-MAC), in ad-hoc networks using IEEE 802.11 at low PHY rate. …”
Conference or Workshop Item -
5
TC-enabled and distributed cloud computing access control model
Published 2014“…Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trust between users, service provider and provided services in a scalable manner. …”
Article -
6
Temporal, delegable and cheap update access control to published XML documents.
Published 2013“…Providing access control for published XML documents on the Web is an important topic. …”
Get full text
Article -
7
Trusted-based scalable access control model for broadcast XML documents.
Published 2013“…XML language is becoming a de facto standard for representing and transmitting data on the web so controlling access to XML documents is an important issue. Several XML access control approaches have been proposed to control the access of the published XML documents but these approaches still cannot scale well wim increased system and management workload because they specify and enforce their access control policies in centralized servers. …”
Get full text
Article -
8
Aspect oriented approach to improvement role based access control systems
Published 2009“…As a case study, we present an aspect-oriented design framework for CORBA Access Control subsystem that supports different role-based access control models.…”
Get full text
Conference or Workshop Item -
9
Push-based XML access control policy languages: a review
Published 2014“…Several access control policy languages have been proposed for specifying access control policies for push-based XML access control systems. …”
Get full text
Conference or Workshop Item -
10
Role performance trust-based access control for protecting sensitive attributes
Published 2016“…Preserving privacy is a challenge and requires the management of access control, which may be based on role, purpose or trust. …”
Get full text
Article -
11
Access control framework in a bring your own device environment
Published 2016Subjects: Get full text
Thesis -
12
Energy-efficient medium access control strategy for cooperative wireless networks
Published 2016“…Furthermore, the proposed optimal power allocation enhances EAP-CMAC performance in terms of network lifetime by 7% compared to equal power allocation.Moreover in this study a cooperative Medium Access Control (MAC) protocol, called Cooperative Cognitive TDMA (CC-TDMA), is proposed for cognitive networks. …”
Get full text
Thesis -
13
Performance and divisional trust and purpose-based access control for privacy preservation
Published 2018“…To keep the privacy safe from inappropriate use, one of the most popular methods that can be used is the access control. Currently, many augmentation of access control models has been developed to improve the effectiveness in preserving the privacy. …”
Get full text
Article -
14
Trust, purpose, and role-based access control model for privacy protection
Published 2019“…Role-based access control model has been proposed to protect customer's data. …”
Get full text
Conference or Workshop Item -
15
Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks
Published 2007Subjects: “…Wireless sensor networks - Access control.…”
Get full text
Thesis -
16
Secure software architecture approach for role-based access control using aspect-oriented design
Published 2010Subjects: Get full text
Thesis -
17
Trust-based access control model with quantification method for protecting sensitive attributes
Published 2022“…Despite the recent advances in access control frameworks and models, there are still issues that hinder the implementation of successful access control. …”
Article -
18
Secure role based access control systems using aspect-orientation designing
Published 2009“…Using role-based access control (RBAC) as an example, currently it supports role hierarchy, static separation of duty relations, and dynamic separation of duty relations. …”
Get full text
Conference or Workshop Item -
19
A distributed push-based XML access control model for better scalability
Published 2008“…XML access control is a non-trivial topic as XML language becomes a standard for data representation and transmission on the Web. …”
Get full text
Conference or Workshop Item -
20
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…In fact, there is a need for fine-grained access control techniques which limit access of specific individuals to resources. …”
Get full text
Thesis