-
41
Automatic Error Finding in Access-Control Policies
Published 2010Subjects: “…access-control policies…”
Get full text
-
42
Team and noncooperative solutions to access control with priorities
Published 2010“…We consider decentralized medium-access control in which many pairwise interactions occur between randomly selected users that belong to a large population. …”
Get full text
Article -
43
-
44
Access control via coalitional power game
Published 2013“…This paper considers the problem of access control in the uplink transmission of an OFDMA femtocell network. …”
Get full text
Get full text
Conference Paper -
45
Embedded biometric verification system for access control
Published 2008“…Build a prototype embedded system using both fingerprint and face verification for high security access control.…”
Get full text
Research Report -
46
-
47
Access control using bluetooth / Esmawanie Esa
Published 2005“…This thesis project proposes a method of access control using Bluetooth. Currently access control methods require physical contact to a device, such as a swipecard. …”
Thesis -
48
Conformance Checking of Dynamic Access Control Policies
Published 2011“…The capture, deployment and enforcement of appropriate access control policies are crucial aspects of many modern software-based systems. …”
Journal article -
49
-
50
Evolving access control: formal models and analysis
Published 2011“…Traditionally, approaches to access control have fallen into one of two categories: discretionary access control (DAC) or mandatory access control (MAC). …”
Thesis -
51
Enhancement of network access control architecture with virtualization
Published 2013“…Therefore, it is necessary to secure enterprise network from being compromised by using endpoint security solution. Network Access Control (NAC) is capable to provide solution for determining the integrity of endpoints which serve as a basis for trustworthy communication. …”
Conference or Workshop Item -
52
Secure data access control with perception reasoning
Published 2018“…In spite of all security issues in the cloud system, distributed cloud environment requires an access control model which should be context aware to handle all issues intelligently. …”
Article -
53
Security extensible access control markup language policy integration based on role-based access control model in healthcare collaborative environments
Published 2011“…Though eXtensible Access Control Markup Language (XACML) has a powerful capacity of expression, it does not support all the elements character of RBAC. …”
Get full text
Article -
54
-
55
-
56
-
57
-
58
-
59
-
60