Showing 41 - 60 results of 362 for search '"access control"', query time: 0.08s Refine Results
  1. 41
  2. 42

    Context-aware learning-based access control method for power IoT by Zhenyu ZHOU, Zehan JIA, Haijun LIAO, Xiongwen ZHAO, Lei ZHANG

    Published 2021-03-01
    “…In view of the problems of severe access conflicts, high queue backlog, and low energy efficiency in the massive terminal access scenario of the power Internet of things (power IoT) in 6G era, a context-aware learning-based access control (CLAC) algorithm was proposed.The proposed algorithm was based on reinforcement learning and fast uplink grant technology, considering active state and dormant state of terminals, and the optimization objective was to maximize the total network energy efficiency under the long-term constraint of terminal access service quality requirements.Lyapunov optimization was used to decouple the long-term optimization objective and constraint, and the long-term optimization problem was transformed into a series of single time-slot independent deterministic sub-problems, which could be solved by the terminal state-aware upper confidence bound algorithm.The simulation results show that CLAC can improve the network energy efficiency while meeting the terminal access service quality requirements.Compared with the traditional fast uplink grant, CLAC can improve the average energy efficiency by 48.11%, increase the proportion of terminals meeting access service quality requirements by 54.95%, and reduce the average queue backlog by 83.83%.…”
    Get full text
    Article
  3. 43
  4. 44
  5. 45
  6. 46

    Privacy risk adaptive access control model via evolutionary game by Hongfa DING, Changgen PENG, Youliang TIAN, Shuwen XIANG

    Published 2019-12-01
    Subjects: “…risk-adaptive based access control…”
    Get full text
    Article
  7. 47
  8. 48
  9. 49

    Access Control Points: Reducing a Possible Blast Impact by Meandering by Martin Larcher, Georgios Valsamos, Vasilis Karlos

    Published 2018-01-01
    “…In response to the heightened terror threat in recent years, there is an increasing interest in the introduction of access control zones at sites that are characterized by an increased likelihood of being the target of a terrorist attack, as latest data reveal that unprotected areas of mass congregation of people have become attractive to terrorist groups. …”
    Get full text
    Article
  10. 50
  11. 51
  12. 52
  13. 53
  14. 54

    Privacy-preserving attribute-based access control using homomorphic encryption by Malte Kerl, Ulf Bodin, Olov Schelén

    Published 2025-01-01
    “…Abstract Authentication and access control for Cyber-Physical Systems (CPSs) are pivotal for protecting systems and their users from problems related to harmful actions and the malicious use of retrieved data. …”
    Get full text
    Article
  15. 55

    Security architecture to support multiple security policies based on access control space by LI Li-ping1, QING Si-han1, HE Ye-ping1, SHEN Qing-ni1

    Published 2006-01-01
    “…In order to solve the problems of policy reusability and policy co-existence in LSM,a new security architecture ELSM is proposed.It introduced Model Combiner as main module to implement module stack management and module decision management.Module decision is based on access control space as policy specification for general support.The design of ELSM and the analysis of its implementation in Ansheng OS prove its effectiveness.…”
    Get full text
    Article
  16. 56
  17. 57
  18. 58
  19. 59
  20. 60