-
1
-
2
MUTATION TESTING OF ACCESS CONTROL POLICIES
Published 2021-02-01Subjects: “…access control…”
Get full text
Article -
3
Application of integration methods between university information systems and access control systems
Published 2024-11-01Subjects: “…campus access control system…”
Get full text
Article -
4
BACAD: AI-based framework for detecting vertical broken access control attacks
Published 2024-12-01Subjects: “…Broken access control…”
Get full text
Article -
5
BPDAC: A Blockchain Based and Provenance Enabled Dynamic Access Control Scheme
Published 2023-01-01Subjects: “…Dynamic access control…”
Get full text
Article -
6
Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions
Published 2023-07-01Subjects: “…access control policies…”
Get full text
Article -
7
SAAC: Secure Access Control Management Framework for Multi-User Smart Home Systems
Published 2024-01-01Subjects: Get full text
Article -
8
Model for attribute based access control
Published 2008-01-01Subjects: “…access control…”
Get full text
Article -
9
Model for attribute based access control
Published 2008-01-01Subjects: “…access control;attribute based access control;attribute;constrained database…”
Get full text
Article -
10
An XML-based model for integrating and managing label-based access control of heterogeneous legacy databases [microfilm] /
Published 2006Subjects: “…Computers -- Access control…”
-
11
Research progress of access control model and policy in online social networks
Published 2016-08-01Subjects: Get full text
Article -
12
Research progress of access control model and policy in online social networks
Published 2016-08-01Subjects: Get full text
Article -
13
A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
Published 2025-01-01Subjects: “…Access control (AC)…”
Get full text
Article -
14
Access management of IoT devices using access control mechanism and decentralized authentication: A review
Published 2023-02-01Subjects: “…Access control…”
Get full text
Article -
15
Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks
Published 2007Subjects: “…Wireless sensor networks - Access control.…”
Get full text
Thesis -
16
Secure software architecture approach for role-based access control using aspect-oriented design
Published 2010Subjects: Get full text
Thesis -
17
A Dynamic Access Control Model Using Authorising Workflow and Task-Role-Based Access Control
Published 2019-01-01Subjects: Get full text
Article -
18
Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review
Published 2022-03-01Subjects: “…access control models…”
Get full text
Article -
19
-
20
Prioritized Secondary User Access Control in Cognitive Radio Networks
Published 2018-01-01Subjects: Get full text
Article