Results 271 to 280 of about 29,464,938 (335)
Some of the next articles are maybe not open access.
Role-Based Access Control and the Access Control Matrix
ACM SIGOPS Operating Systems Review, 2001The Access Matrix is a useful model for understanding the behaviour and properties of access control systems. While the matrix is rarely implemented, access control in real systems is usually based on access control mechanisms, such as access control lists or capabilities, that have clear relationships with the matrix model.
G. Saunders +2 more
openaire +1 more source
A Survey on Access Control in the Age of Internet of Things
IEEE Internet of Things Journal, 2020With the development of Internet-of-Things (IoT) technology, various types of information, such as social resources and physical resources, are deeply integrated for different comprehensive applications.
Jing Qiu +5 more
semanticscholar +1 more source
2019
Evolution of healthcare systems and the constantly changing regulatory landscape continuously alter all facets of health information technology including access. Access to information systems must be controlled in order to protect privacy and confidentiality.
Karl E. Misulis, Mark E. Frisse
openaire +1 more source
Evolution of healthcare systems and the constantly changing regulatory landscape continuously alter all facets of health information technology including access. Access to information systems must be controlled in order to protect privacy and confidentiality.
Karl E. Misulis, Mark E. Frisse
openaire +1 more source
IEEE Transactions on Vehicular Technology, 2020
Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in fine-grained access control to achieve the secure data sharing. However, most of the existing CP-ABE access control schemes involve intermediary entities, which might suffer from a ...
Sheng Gao +4 more
semanticscholar +1 more source
Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in fine-grained access control to achieve the secure data sharing. However, most of the existing CP-ABE access control schemes involve intermediary entities, which might suffer from a ...
Sheng Gao +4 more
semanticscholar +1 more source
2007
Presentazione delle caratteristiche principali delle tecnologie per il controllo dell’accesso.
S. De Capitani di Vimercati +3 more
openaire +4 more sources
Presentazione delle caratteristiche principali delle tecnologie per il controllo dell’accesso.
S. De Capitani di Vimercati +3 more
openaire +4 more sources
Personalizing access control by generalizing access control
Proceedings of the 15th ACM symposium on Access control models and technologies, 2010We address the problem of providing data subjects with self-selected controls on access to their personal information. Existing approaches for this are not always sufficient in terms of offering the degrees of control and scope for individualization of access policies that are needed for personal data protection (and usage).
openaire +2 more sources
ACM SIGSPATIAL International Workshop on Advances in Geographic Information Systems, 2019
Wayne Patterson +1 more
openaire +2 more sources
Wayne Patterson +1 more
openaire +2 more sources
Dynamic Access Control and Authorization System based on Zero-trust architecture
International Conference on Control, Robotics and Intelligent System, 2020With the development of cloud computing, artificial intelligence, big data and other technologies, network systems are facing more and more security risks and threats.
Qigui Yao +3 more
semanticscholar +1 more source
SBAC: A secure blockchain-based access control framework for information-centric networking
Journal of Network and Computer Applications, 2020The information-centric networking (ICN) has been proposed to meet the increasing demand for efficient content delivery. However, the in-network caching mechanism of ICN makes it hard to provide data security and privacy for content providers (CPs ...
Qiuyun Lyu +5 more
semanticscholar +1 more source
ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things
ACM Symposium on Access Control Models and Technologies, 2020Internet of Things (IoT) is revolutionizing the capabilities of the Internet with billions of connected devices in the cyberspace. These devices are commonly referred to as smart things enabling smart environments, such as Smart Home, Smart Health, Smart
Smriti Bhatt, R. Sandhu
semanticscholar +1 more source

