Showing 141 - 160 results of 2,401 for search '"access control"', query time: 0.15s Refine Results
  1. 141
  2. 142
  3. 143

    An Access Control Model for Preventing Virtual Machine Hopping Attack by Ying Dong, Zhou Lei

    Published 2019-03-01
    “…In addition, we designed the access control model PVMH (Prevent VM hopping) to prevent VM hopping attacks based on the BLP model and the Biba model. …”
    Get full text
    Article
  4. 144
  5. 145

    Blockchain aware decentralized identity management and access control system by Aarti Amod Agarkar, Mandar Karyakarte, Gajanan Chavhan, Milind Patil, Rajendra Talware, Lalit Kulkarni

    Published 2024-02-01
    “…This paper presents a blockchain-aware decentralized identity management and access control (BADIMAC) model that mitigates these barriers. …”
    Get full text
    Article
  6. 146
  7. 147

    Parallel and Distributed Computation of a Fingerprint Access Control System by Bopatriciat Boluma Mangata, Kadima Muamba, Fundji Khalaba, Bukanga Christian Parfum, Kisiaka Mbambi

    Published 2022-09-01
    “… This work evaluates the runtime performance of a single-mode biometric recognition system for fingerprint-based access control to secure premises. To speed up the computation time in this system, we resorted to parallel programming, targeting more loops in the verification module. …”
    Get full text
    Article
  8. 148
  9. 149
  10. 150
  11. 151

    Policy-Based Access Control in Federated Clinical Question Answering by Chen, Alice

    Published 2024
    “…However, due to its sensitive nature, patient medical data often requires retrieval to be federated across a decentralized network of hospital institutions, each maintaining internal databases and access control policies. Applying standard RAG to clinical question-answering tasks is complicated by the lack of an interface for hospital resource owners to regulate and restrict access to sensitive clinical documents during retrieval, which is essential for model feasibility in practice. …”
    Get full text
    Thesis
  12. 152

    Nemesis: Preventing Authentication & [and] Access Control Vulnerabilities in Web Applications by Dalton, Michael, Kozyrakis, Christos, Zeldovich, Nickolai

    Published 2011
    “…This paper presents Nemesis, a novel methodology for mitigating authentication bypass and access control vulnerabilities in existing web applications. …”
    Get full text
    Get full text
    Article
  13. 153
  14. 154

    Efficient media access control protocol for wireless multimedia networks by Ma, Miao

    Published 2008
    “…This thesis is concerned with the design and evaluation of a simple and flexible media access control (MAC) protocol that can adapt to different traffic conditions and quality of service (QoS) requirements of the multimedia traffic in CDMA systems.…”
    Get full text
    Thesis
  15. 155

    Graphical wireless medium access control (MAC) protocol simulator by Tan, Shermin Weixiu

    Published 2014
    “…Paper documents and PowerPoint presentations do not provide an interactive platform for keen learners to learn the concepts of the Medium Access Control (MAC) protocol, Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA) for IEEE 802.11 Standard. …”
    Get full text
    Final Year Project (FYP)
  16. 156

    Proof-of-concept blockchain application for access controlled file transfer by Phang, Jun Yu

    Published 2019
    “…In this paper, we introduce different Token mechanisms and explore the most feasible way to build an access control layer on top of a blockchain for file management. …”
    Get full text
    Final Year Project (FYP)
  17. 157

    Role based access control for knowledge sharing in remote areas by Usino, Wendi, Mantoro, Teddy, Ayu, Media Anugerah, Harjanto, Nazir

    Published 2011
    “…This paper introduces a Role Based Access Control (RBAC) for e-Village in creating and sharing knowledge in a secure way. …”
    Get full text
    Get full text
    Proceeding Paper
  18. 158
  19. 159
  20. 160

    TC-enabled and distributed cloud computing access control model by Halboob, Waleed, Mahmod, Ramlan, Alghathbar, Khaled S., Mamat, Ali

    Published 2014
    “…Controlling access to the cloud computing services involves new scalability and security challenges that cannot be directly addressed by traditional access control solutions. In other words, cloud computing access control requires establishing a trust between users, service provider and provided services in a scalable manner. …”
    Article