Showing 1 - 20 results of 2,401 for search '"access control"', query time: 0.31s Refine Results
  1. 1
  2. 2

    Wireless access control by Teck Ping, Lee

    Published 2005
    Get full text
    Undergraduates Project Papers
  3. 3

    Securing campus access control and management system with attribute-based access control (ABAC) by Chong, Chee Xuan

    Published 2022
    “…The registration and access control becoming worst during the covid-19 pandemic. …”
    Get full text
    Get full text
    Academic Exercise
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Ontology Based Access Control by Özgü CAN, Murat Osman ÜNALIR

    Published 2010-02-01
    “…As computer technologies become pervasive, the need for access control mechanisms grow. The purpose of an access control is to limit the operations that a computer system user can perform. …”
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Risk access control model for Hadoop by Jia-shuai LI,Yi-jie ZHU,Hai-feng MA, Chang-gen PENG

    Published 2016-01-01
    Subjects: “…risk access control…”
    Get full text
    Article
  14. 14

    Private Information Retrieval with Access Control by Goyal, Pawan

    Published 2023
    “…However, PIR does not provide access control guarantees, allowing any user access to any record. …”
    Get full text
    Thesis
  15. 15
  16. 16

    The formalisation and transformation of access control policies by Slaymaker, M, Mark Slaymaker

    Published 2011
    “…Each data owner will have access control policies that are carefully crafted and understood --- defined in terms of the access control representation that they use, which may be very different from the model of access control utilised by other data owners or by the technology facilitating the data sharing. …”
    Thesis
  17. 17

    Access control in open distributed systems by Udzir, Nur Izura, Wood, Alan, Muda, Zaiton, Dehghantanha, Ali, Abdullah @ Selimun, Mohd Taufik, Abdullah, Azizol

    Published 2012
    “…In this paper, we discuss two conventional access control mechanisms-access control lists and capabilities-which can be incorporated in the Linda·model, and their suitability and implications on the flexibility of the model.…”
    Get full text
    Conference or Workshop Item
  18. 18

    User access control and security model by Crysdian, Cahyo, Selamat, Harihodin, Md. Sap, Mohd. Noor

    Published 2000
    “…Development of user access control began on the early of seventies with DAC technology. …”
    Get full text
    Article
  19. 19

    A study on physical access control using QR code as virtual identification system for door access control by Rajangeran, Ashvini Priya, Sandra Sekaran, Puvanah, Sidi, Fatimah, Hairani, Saiful Ramadzan, Daud, Mohd Faizal, Razak, Rizal

    Published 2019
    “…The system develops a centralized door access control management system which is used to store the time stamp of students and staff, and introduces an IoT-based door access control system using the QR code of PutraVID.…”
    Get full text
    Conference or Workshop Item
  20. 20