Showing 121 - 140 results of 2,401 for search '"access control"', query time: 0.23s Refine Results
  1. 121

    Preference-Aware User Access Control Policy in Internet of Things by Songnong Li, Yao Yan, Yongliang Ji, Wenxin Peng, Lingyun Wan, Puning Zhang

    Published 2023-06-01
    “…There are multiple types of services in the Internet of Things, and existing access control methods do not consider situations wherein the same types of services have multiple access options. …”
    Get full text
    Article
  2. 122
  3. 123
  4. 124
  5. 125

    Research on electronic medical record access control based on blockchain by Yongbin Zhao, Meng Cui, Lijuan Zheng, Rui Zhang, Lili Meng, Dong Gao, Yu Zhang

    Published 2019-11-01
    “…In view of these problems, a blockchain-based electronic medical record access control research scheme based on the role-based access control model is proposed in this article. …”
    Get full text
    Article
  6. 126
  7. 127
  8. 128
  9. 129

    Modelling and Simulating Access Control in Wireless Ad-Hoc Networks by N. A. Azeez, A. E. Otudor

    Published 2016-12-01
    “…Keywords: Access control, NS 2, Ad-Hoc, MANET, Mobile, Simulation. …”
    Get full text
    Article
  10. 130
  11. 131
  12. 132

    A New Design of Access Control in Wireless Sensor Networks by Hui-Feng Huang

    Published 2011-04-01
    “…To prevent malicious nodes from joining the sensor networks, access control is a designed requirement for controlling sensor node deployment. …”
    Get full text
    Article
  13. 133

    Adaptive Access Control Mechanism (AACM) for Enterprise Cloud Computing by Amardeep Kaur, Amandeep Verma

    Published 2023-01-01
    “…In the role-based access control model, access to resources is based on a user’s role in the enterprise. …”
    Get full text
    Article
  14. 134
  15. 135
  16. 136
  17. 137
  18. 138

    AACS: Attribute-Based Access Control Mechanism for Smart Locks by Zhenghao Xin, Liang Liu, Gerhard Hancke

    Published 2020-06-01
    Subjects: “…attribute-based access control…”
    Get full text
    Article
  19. 139
  20. 140