-
61
Access control model for multi-source heterogeneous data in big data environment
Published 2019-02-01Subjects: Get full text
Article -
62
Application of the Extension RBAC Model in the Family Open Platform
Published 2015-11-01Subjects: Get full text
Article -
63
Fine-grained attribute update and outsourcing computing access control scheme in fog computing
Published 2021-03-01Subjects: “…access control…”
Get full text
Article -
64
Fused access control scheme for sensitive data sharing
Published 2014-08-01Subjects: Get full text
Article -
65
Conditioned secure access control model based on multi-weighted roles and rules in workflow system
Published 2008-01-01Subjects: Get full text
Article -
66
-
67
Quantum secure patient login credential system using blockchain for electronic health record sharing framework
Published 2025-02-01Subjects: Get full text
Article -
68
Producing secure multimodal biometric descriptors using artificial neural networks
Published 2021-03-01Subjects: “…biometrics (access control)…”
Get full text
Article -
69
Two-hop cover-based access control scheme for wireless sensor networks
Published 2010-01-01Subjects: Get full text
Article -
70
Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment
Published 2025-01-01Subjects: Get full text
Article -
71
Risk access control model for Hadoop
Published 2016-01-01Subjects: “…risk access control…”
Get full text
Article -
72
Study on a cooperative MAC protocol with priority-based contention for wireless networks
Published 2011-01-01Subjects: “…cooperative medium access control…”
Get full text
Article -
73
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
Published 2025-01-01Subjects: “…Role-based access control…”
Get full text
Article -
74
Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain
Published 2020-04-01Subjects: “…WLAN access control…”
Get full text
Article -
75
Access control security model based on behavior in cloud computing environment
Published 2012-03-01Subjects: Get full text
Article -
76
Multi-channel MAC protocol based on network partitioning for wireless sensor networks
Published 2014-11-01Subjects: Get full text
Article -
77
Research on cross-domain access control technology
Published 2021-02-01Subjects: Get full text
Article -
78
Attribute-based lightweight reconfigurable access control policy
Published 2020-02-01Subjects: Get full text
Article -
79
On access to trusted virtual group under cloud computing
Published 2013-08-01Subjects: Get full text
Article -
80
Cross‐ethnicity face anti‐spoofing recognition challenge: A review
Published 2021-01-01Subjects: “…biometrics (access control)…”
Get full text
Article