-
61
Integrated lab door access control (iLDAC)
Published 2018“…Integrated Lab Door Access Control system is a mobile application that integrated with RFID technology. …”
Get full text
Undergraduates Project Papers -
62
An access control for KUKTEM wired LAN AC spot
Published 2006Get full text
Undergraduates Project Papers -
63
Misconfiguration in Firewalls and Network Access Controls: Literature Review
Published 2021-11-01Subjects: Get full text
Article -
64
Information-flow-based Access Control for Virtualized Systems
Published 2014-12-01Subjects: Get full text
Article -
65
The Methods and Mechanisms for Access Control of Encrypted Data in Clouds
Published 2013-09-01Subjects: Get full text
Article -
66
Techno-Economic Design and Implementation of Vehicular Access Control
Published 2023-01-01Subjects: “…access control…”
Get full text
Article -
67
The Modification of Hierarchical Tree for Roles Based Access Control
Published 2010-09-01Subjects: Get full text
Article -
68
The poor usability of OpenLDAP Access Control Lists
Published 2023-01-01“…Abstract The usability of Access Control Lists (ACLs) of a widely used enterprise software for directory information services called OpenLDAP is addressed. …”
Get full text
Article -
69
Statement Recognition of Access Control Policies in IoT Networks
Published 2023-09-01Subjects: “…access control policies…”
Get full text
Article -
70
Blockchain Platforms and Access Control Classification for IoT Systems
Published 2020-10-01Subjects: “…access control (AC)…”
Get full text
Article -
71
Enhanced Authentication for Decentralized IoT Access Control Architecture
Published 2023-08-01“…To comprehensively mitigate these issues, we presents a novel IoT access control architecture in this paper. The proposed architecture leverages the OAuth framework for authorization and the decentralized identity technology to enhance the authentication and authorization processes.…”
Get full text
Article -
72
Lambda-RBAC: Programming with Role-Based Access Control
Published 2008-01-01“…We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanisms, which permit access controls to be expressed, in situ, as part of the code realizing basic functionality. …”
Get full text
Article -
73
DEVELOPMENT OF ACCESS CONTROL MODEL TO PRIVATE MEDICAL INFORMATION
Published 2018-10-01“…In this article, the authors are considering designing an access control model that solves the problem of providing information security for medical systems and is based on access control based on roles with minimal constraints. …”
Get full text
Article -
74
Secure Access Control Method for Wireless Sensor Networks
Published 2015-07-01“…In this study, we propose a new access control method based on elliptic curve cryptography and the chameleon hash function. …”
Get full text
Article -
75
Blockchain-Based Access Control Techniques for IoT Applications
Published 2022-07-01Subjects: Get full text
Article -
76
Designing role-based access control policies with UML
Published 2009-01-01“…The paper analyses role-based access control (RBAC) and two methodologies, namely SecureUML and UMLsec, aiming for designing RBAC policies. …”
Get full text
Article -
77
Improving the Authentication Scheme and Access Control Protocol for VANETs
Published 2014-11-01Subjects: Get full text
Article -
78
Access control model to the systems containing the interchangeable objects
Published 2016-06-01Subjects: Get full text
Article -
79
Hyperledger Fabric Access Control for Industrial Internet of Things
Published 2022-03-01Subjects: Get full text
Article -
80
Blockchain-Based Secured Access Control in an IoT System
Published 2021-02-01Subjects: “…access control…”
Get full text
Article