Showing 61 - 80 results of 2,401 for search '"access control"', query time: 0.15s Refine Results
  1. 61

    Integrated lab door access control (iLDAC) by Cheng, Wei Quan

    Published 2018
    “…Integrated Lab Door Access Control system is a mobile application that integrated with RFID technology. …”
    Get full text
    Undergraduates Project Papers
  2. 62
  3. 63
  4. 64
  5. 65
  6. 66
  7. 67
  8. 68

    The poor usability of OpenLDAP Access Control Lists by Yi Fei Chen, Rahul Punchhi, Mahesh Tripunitara

    Published 2023-01-01
    “…Abstract The usability of Access Control Lists (ACLs) of a widely used enterprise software for directory information services called OpenLDAP is addressed. …”
    Get full text
    Article
  9. 69
  10. 70
  11. 71

    Enhanced Authentication for Decentralized IoT Access Control Architecture by Jeong Hwa Kang, Minhye Seo

    Published 2023-08-01
    “…To comprehensively mitigate these issues, we presents a novel IoT access control architecture in this paper. The proposed architecture leverages the OAuth framework for authorization and the decentralized identity technology to enhance the authentication and authorization processes.…”
    Get full text
    Article
  12. 72

    Lambda-RBAC: Programming with Role-Based Access Control by Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely

    Published 2008-01-01
    “…We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanisms, which permit access controls to be expressed, in situ, as part of the code realizing basic functionality. …”
    Get full text
    Article
  13. 73

    DEVELOPMENT OF ACCESS CONTROL MODEL TO PRIVATE MEDICAL INFORMATION by Андрій Сергійович Андрійчук, Анастасія Андріївна Стрєлкіна

    Published 2018-10-01
    “…In this article, the authors are considering designing an access control model that solves the problem of providing information security for medical systems and is based on access control based on roles with minimal constraints. …”
    Get full text
    Article
  14. 74

    Secure Access Control Method for Wireless Sensor Networks by Cheng-Yeh Chen, Alan Dahgwo Yein, Te-Cheng Hsu, John Y. Chiang, Wen-Shyong Hsieh

    Published 2015-07-01
    “…In this study, we propose a new access control method based on elliptic curve cryptography and the chameleon hash function. …”
    Get full text
    Article
  15. 75
  16. 76

    Designing role-based access control policies with UML by L. Radvilavicius, A. Normantas, A. Cenys

    Published 2009-01-01
    “…The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLsec, aiming for designing RBAC policies. …”
    Get full text
    Article
  17. 77
  18. 78
  19. 79
  20. 80