Showing 1 - 20 results of 138 for search '"access control"', query time: 0.07s Refine Results
  1. 1

    BIOMETRIC ACCESS CONTROL SYSTEMS BASED ON FINGERPRINTS by V. V. Starovoitov

    Published 2016-09-01
    “…Features of biometric access control system design for control people's access to certain facilitiesare described. …”
    Get full text
    Article
  2. 2

    Embedding Trust in the Media Access Control Protocol for Wireless Networks by Chaminda Alocious, Hannan Xiao, Bruce Christianson, Joseph Spring

    Published 2025-01-01
    “…IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. …”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Access Control Points: Reducing a Possible Blast Impact by Meandering by Martin Larcher, Georgios Valsamos, Vasilis Karlos

    Published 2018-01-01
    “…In response to the heightened terror threat in recent years, there is an increasing interest in the introduction of access control zones at sites that are characterized by an increased likelihood of being the target of a terrorist attack, as latest data reveal that unprotected areas of mass congregation of people have become attractive to terrorist groups. …”
    Get full text
    Article
  6. 6
  7. 7

    Privacy-preserving attribute-based access control using homomorphic encryption by Malte Kerl, Ulf Bodin, Olov Schelén

    Published 2025-01-01
    “…Abstract Authentication and access control for Cyber-Physical Systems (CPSs) are pivotal for protecting systems and their users from problems related to harmful actions and the malicious use of retrieved data. …”
    Get full text
    Article
  8. 8
  9. 9

    A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing by Canling Wang, Wei Wu, Fulong Chen, Hong Shu, Ji Zhang, Yuxuan Zhang, Taochun Wang, Dong Xie, Chuanxin Zhao

    Published 2024-01-01
    “…Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability. …”
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Eksplorasi ABAC dan XACML untuk Design Access Control pada Resource Digital by Fauzan Natsir, Imam Riadi, Yudi Prayudi

    Published 2019-10-01
    “…Akses kontrol lebih fleksibel dibanding dengan pendekatan otorisasi, autentikasi ataupun verifikasi yang sangat sederhana. Mekanisme access control policy dengan pendekatan atribut diyakini sebagai solusi adaptif yaitu ABAC (Attribute Based Access Control) dengan implementasi model XACML (Extensible Access Control Modelling Language). …”
    Get full text
    Article
  13. 13
  14. 14

    Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method by Meiqin Tang, Lili Shang, Yalin Xin, Xiaohua Liu, Xinjiang Wei

    Published 2014-01-01
    “…A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. …”
    Get full text
    Article
  15. 15
  16. 16

    Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments by Aiguo Chen, Guoming Lu, Hanwen Xing, Yuan Xie, Shunwei Yuan

    Published 2020-05-01
    “…The experimental results demonstrate that this dynamic and semantic-aware access-control model is highly dynamic and flexible and can improve the security of the application system.…”
    Get full text
    Article
  17. 17

    Parameter analysis and optimization of polling-based medium access control protocol for multi-sensor communication by Jialin Guo, Fufang Li, Tian Wang, Shaobo Zhang, Yuqing Zhao

    Published 2021-04-01
    “…An adaptive parameter optimization polling-based medium access control protocol is proposed to optimize network performance. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks by Ye Tian, Yanbin Peng, Xinguang Peng, Hongbin Li

    Published 2014-11-01
    “…In this paper, we design an attribute-based encryption scheme for fine-grained access control in WBANs. In our scheme, a user can decrypt a ciphertext if the attributes related with a ciphertext satisfy the user's access structure. …”
    Get full text
    Article