Results 251 to 260 of about 2,029,120 (306)
A Novel Framed Slotted Aloha Medium Access Control Protocol Based on Capture Effect in Vehicular Ad Hoc Networks. [PDF]
Lai L, Song Z, Xu W.
europepmc +1 more source
A Bag of Words Model for Efficient Discovery of Roles in Access Control Systems
Carlo Blundo, Stelvio Cimato
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Role-Based Access Control and the Access Control Matrix
ACM SIGOPS Operating Systems Review, 2001The Access Matrix is a useful model for understanding the behaviour and properties of access control systems. While the matrix is rarely implemented, access control in real systems is usually based on access control mechanisms, such as access control lists or capabilities, that have clear relationships with the matrix model.
G. Saunders +2 more
openaire +1 more source
2019
Evolution of healthcare systems and the constantly changing regulatory landscape continuously alter all facets of health information technology including access. Access to information systems must be controlled in order to protect privacy and confidentiality.
Karl E. Misulis, Mark E. Frisse
openaire +1 more source
Evolution of healthcare systems and the constantly changing regulatory landscape continuously alter all facets of health information technology including access. Access to information systems must be controlled in order to protect privacy and confidentiality.
Karl E. Misulis, Mark E. Frisse
openaire +1 more source
2007
Presentazione delle caratteristiche principali delle tecnologie per il controllo dell’accesso.
S. De Capitani di Vimercati +3 more
openaire +4 more sources
Presentazione delle caratteristiche principali delle tecnologie per il controllo dell’accesso.
S. De Capitani di Vimercati +3 more
openaire +4 more sources
Personalizing access control by generalizing access control
Proceedings of the 15th ACM symposium on Access control models and technologies, 2010We address the problem of providing data subjects with self-selected controls on access to their personal information. Existing approaches for this are not always sufficient in terms of offering the degrees of control and scope for individualization of access policies that are needed for personal data protection (and usage).
openaire +2 more sources
Cloud Security Access Control: Distributed Access Control
2020Jim Harmening, Randall DeVitto
openaire +1 more source
Cervical cancer prevention and control in women living with human immunodeficiency virus
Ca-A Cancer Journal for Clinicians, 2021Philip E Castle, Vikrant V Sahasrabuddhe
exaly

