Showing 41 - 60 results of 2,401 for search '"access control"', query time: 0.16s Refine Results
  1. 41
  2. 42

    Team and noncooperative solutions to access control with priorities by Suárez, Alberto, Altman, Eitan, Menache, Ishai

    Published 2010
    “…We consider decentralized medium-access control in which many pairwise interactions occur between randomly selected users that belong to a large population. …”
    Get full text
    Article
  3. 43
  4. 44

    Access control via coalitional power game by Guruacharya, Sudarshan, Niyato, Dusit, Kim, Dong In

    Published 2013
    “…This paper considers the problem of access control in the uplink transmission of an OFDMA femtocell network. …”
    Get full text
    Get full text
    Conference Paper
  5. 45

    Embedded biometric verification system for access control by Lai, Edmund Ming-Kit, Leung, Maylor K. H., Hui, Siu Cheung

    Published 2008
    “…Build a prototype embedded system using both fingerprint and face verification for high security access control.…”
    Get full text
    Research Report
  6. 46
  7. 47

    Access control using bluetooth / Esmawanie Esa by Esa, Esmawanie

    Published 2005
    “…This thesis project proposes a method of access control using Bluetooth. Currently access control methods require physical contact to a device, such as a swipecard. …”
    Thesis
  8. 48

    Conformance Checking of Dynamic Access Control Policies by Power, D, Slaymaker, M, Simpson, A

    Published 2011
    “…The capture, deployment and enforcement of appropriate access control policies are crucial aspects of many modern software-based systems. …”
    Journal article
  9. 49
  10. 50

    Evolving access control: formal models and analysis by Sieunarine, C, Clint Sieunarine

    Published 2011
    “…Traditionally, approaches to access control have fallen into one of two categories: discretionary access control (DAC) or mandatory access control (MAC). …”
    Thesis
  11. 51

    Enhancement of network access control architecture with virtualization by Annuar, Hairil, Shanmugam, Bharanidharan, Ahmad, Azuan, Idris, Norbik Bashah, Hasan AlBakri, Sameer, Narayana Sami, Ganthan

    Published 2013
    “…Therefore, it is necessary to secure enterprise network from being compromised by using endpoint security solution. Network Access Control (NAC) is capable to provide solution for determining the integrity of endpoints which serve as a basis for trustworthy communication. …”
    Conference or Workshop Item
  12. 52

    Secure data access control with perception reasoning by Abdul Mateen, Abdul Mateen, Abdul Rauf, Abdul Rauf, Abdullah, Abdul Hanan, Ashraf, Mahmood

    Published 2018
    “…In spite of all security issues in the cloud system, distributed cloud environment requires an access control model which should be context aware to handle all issues intelligently. …”
    Article
  13. 53

    Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments by Teo, Poh Kuang, Ibrahim, Hamidah, Udzir, Nur Izura, Sidi, Fatimah

    Published 2011
    “…Though eXtensible Access Control Markup Language (XACML) has a powerful capacity of expression, it does not support all the elements character of RBAC. …”
    Get full text
    Article
  14. 54
  15. 55
  16. 56
  17. 57
  18. 58
  19. 59
  20. 60