-
1
Topology Management System for Wireless Local Area Network
Published 2014-12-01Subjects: Get full text
Article -
2
Application of integration methods between university information systems and access control systems
Published 2024-11-01Subjects: “…campus access control system…”
Get full text
Article -
3
Model for attribute based access control
Published 2008-01-01Subjects: “…access control…”
Get full text
Article -
4
Research progress of access control model and policy in online social networks
Published 2016-08-01Subjects: Get full text
Article -
5
A Systematic Review of Access Control Models: Background, Existing Research, and Challenges
Published 2025-01-01Subjects: “…Access control (AC)…”
Get full text
Article -
6
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01Subjects: Get full text
Article -
7
On the fly biometric identification system using hand‐geometry
Published 2021-05-01Subjects: “…biometrics (access control)…”
Get full text
Article -
8
Blockchain enabled policy-based access control mechanism to restrict unauthorized access to electronic health records
Published 2025-01-01Subjects: “…Access control…”
Get full text
Article -
9
Access control policy management based on extended-XACML
Published 2007-01-01Subjects: “…access control…”
Get full text
Article -
10
Automatic Verification Analysis Technology of Network Security Domain
Published 2015-01-01Subjects: Get full text
Article -
11
Design for database access control mechanism based on blockchain
Published 2020-05-01Subjects: Get full text
Article -
12
Roles query algorithm in cloud computing environment based on user require
Published 2011-01-01Subjects: Get full text
Article -
13
Spectral-clustering-based abnormal permission assignments hunting framework
Published 2017-12-01Subjects: “…access control…”
Get full text
Article -
14
Lip print‐based identification using traditional and deep learning
Published 2023-01-01Subjects: “…access control…”
Get full text
Article -
15
BSAMS: Blockchain-Based Secure Authentication Scheme in Meteorological Systems
Published 2023-03-01Subjects: Get full text
Article -
16
Dynamic and adaptive access control model
Published 2016-11-01Subjects: “…access control…”
Get full text
Article -
17
R~2BAC:a risk-based multi-domain secure interoperation model
Published 2008-01-01Subjects: “…access control…”
Get full text
Article -
18
Blockchain-based access control mechanism for data traceability
Published 2020-12-01Subjects: Get full text
Article -
19
Community field-centric trust-based access control model
Published 2013-09-01Subjects: Get full text
Article -
20
Library resource sharing solution based on federated authentication and CALIS unified authentication
Published 2013-09-01Subjects: Get full text
Article