Printer Friendly

Browse Access control topic

Articles

1-101 out of 101 article(s)
Title Author Type Date Words
A Trust-Game-Based Access Control Model for Cloud Service. Jun, Sun Pan Report Aug 31, 2020 9308
Three-Dimensional Head-Pose Estimation for Smart Iris Recognition from a Calibrated Camera. Akrout, Belhassen; Fakhfakh, Sana Report Jul 31, 2020 6613
Top 10 Ways to Make a Document Accessible: It takes less time and energy to create an accessible document than to retroactively redesign it to be accessible. Lin, Jamie Apr 1, 2019 1190
Security based Partner Selection in Inter-Organizational Workflow Systems. Kandoussi, Asmaa El; Elbakkali, Hanan Report Dec 1, 2018 6704
Access: MANAGING CONTACTS. Long, Crystal Nov 1, 2018 861
WDVA: Exhibits filed publicly won't be sealed. Lightle, Rebecca M. Jul 29, 2018 980
Fuzzy Keyword Search Method over Ciphertexts supporting Access Control. Mei, Zhuolin; Wu, Bin; Tian, Shengli; Ruan, Yonghui; Cui, Zongmin Report Nov 1, 2017 12544
An efficient friend recommendation system and Multiparty Access Control in online social networks. Shanmugapriya, K.; Dhanalakshmi, K. Report May 1, 2017 4133
A trust based mechanism for preventing compromised and faulty nodes in wireless sensor networks. Hemalatha, P.; Dhanalakshmi, K. Report May 1, 2017 4521
Secure access control on data aggregation for remote sensor networks. Aishwarya, R.; Babu, S. Sathees Report May 1, 2017 3480
CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy. Helil, Nurmamat; Rahman, Kaysar Report Jan 1, 2017 10616
Protecting Private Data by Honey Encryption. Yin, Wei; Indulska, Jadwiga; Zhou, Hongjian Report Jan 1, 2017 6314
A novel access control model based on the structure of applications. Rezakhani, Afshin; Shirazi, Hossein; Modiri, Naser Report Aug 1, 2016 4954
Access: 12 ways of access. Cox, Patricia Dec 1, 2015 1006
Access: leverage access and excel. Cox, Patricia Jul 1, 2015 824
Open data: shining a light on data management practices. Clobridge, Abby Jul 1, 2015 2067
Importing data. Cox, Patricia Column Jun 1, 2015 883
Be a part of the revolution in access control. May 1, 2015 103
Security study: ditch the username and password. Apr 17, 2015 592
Design and analysis of lightweight trust mechanism for accessing data in MANETs. Kumar, Adarsh; Gopal, Krishna; Aggarwal, Alok Report Mar 1, 2014 10865
Trust-based access control model from sociological approach in dynamic online social network environment. Baek, Seungsoo; Kim, Seungjoo Report Jan 1, 2014 4862
Dynamic access control model for security client services in smart grid. Yeo, Sang-Soo; Kim, Si-Jung; Cho, Do-Eun Report Jan 1, 2014 4251
User access control and authentication system for VoIP service in mobile communication environments. Yang, Ho-Kyung; Moon, Jeong-Kyung; Choi, Cheol-Rim; Ryou, Hwang-Bin Report Jan 1, 2014 3106
Comparison of Student-Level and School-Level Data in a National Impact Evaluation. Velez, Melissa; Sahni, Sarah; Rulf-Fountain, Alyssa; Gamse, Beth Report Jan 1, 2014 359
Enhancing workflow systems resiliency by using delegation and priority concepts. Bakkali, Hanan El Report Aug 1, 2013 6226
Some aspects of voice user interfaces development for internet and computer control applications. Maskeliunas, R.; Ratkevicius, K.; Rudzionis, V. Report Feb 1, 2013 2831
And your Facebook password is ... Pike, George H. Sep 1, 2012 1081
Trustworthy mutual attestation protocol for local true Single Sign-On system: proof of concept and performance evaluation. Khattak, Zubair Ahmad; Ab Manan, Jamalul-lail; Sulaiman, Suziah Sep 1, 2012 8641
ACCESS TO DOCUMENTS : REVISION OF REGULATION "AT IMPASSE". Brief article Jun 12, 2012 285
Privileged access Lifecycle Management. Mutch, John May 1, 2012 818
QoS provisioning in wireless body area networks: a review on MAC aspects. Thapa, Anup; Shin, Seokjoo Technical report May 1, 2012 10050
OA: the debate continues. Ojala, Marydee May 1, 2012 1148
Govt bid to filter web still facing resistance. Apr 1, 2012 566
A formal semantic model for the access specification language RASP. Evered, Mark Report Apr 1, 2012 6229
URL filtration proposal required. Brief article Mar 11, 2012 206
Rationale and design of the access specification language RASP. Evered, Mark Report Jan 1, 2012 6039
Provisional access control model for mobile ad-hoc environments: application to mobile electronic commerce. Shin, Heechang; Moscato, Donald Report Dec 1, 2011 4711
A dynamic role-based authorization model in grid environment. Sun, Weifeng; Guo, Cheng; Zhang, Peng; Zhang, Ning; Wang, Haotian Report Dec 1, 2011 4772
Texas grants access to 'Archaic records'. Brief article Nov 1, 2011 192
Trust and risk based access control and access control constraints. Helil, Nurmamat; Kim, Mucheol; Han, Sangyong Report Nov 1, 2011 8661
The Air-Sea Battle concept. Speech Dec 15, 2010 2057
A novel access control strategy for distributed data systems. Zhang, Jianying; Wang, Xiukun; Liu, Hongbo; Meng, Jun Report Oct 1, 2010 6525
MAIN CASES. Sep 20, 2010 848
Multi-access control of distributed mobile robotic systems based on networking technologies. Andreev, Victor Pavlovich; Pryanichnikov, Valentin E.; Prysev, Evgeny Aleksandrovich Report Jan 1, 2010 1770
Banking on privacy. Wolfsie, Dick Feb 1, 2009 590
Extension of IEC's Generic Data Access with a locking mechanism. Vukmirovic, S.; Erdeljan, A.; Lendak, I.; Capko, D. Report Jan 1, 2009 3261
Optimising distributed access control systems using associative rules. Gams, Matjaz; Vlad, Madalin Stefan; Mircevska, Violeta; Cosoi, Alexandru Catalin; Corduneanu, Maria; Report Jan 1, 2009 1900
An access control pattern based on qualifications to grand access to physic resources. Cristea, Ana Daniela; Prostean, Octavian; Muschalik, Thomas; Tirian, Gelu Ovidiu Report Jan 1, 2009 1682
More access needed to biotech crop data. Dec 1, 2008 316
Egypt opens Rafah crossing. Brief article Aug 30, 2008 182
TRANSPARENCY : OMBUDSMAN SLAMS COMMISSION'S APPROACH TO DOCUMENT ACCESS. Jun 3, 2008 399
Signify advocates home working security. Brief article May 16, 2008 113
Intelligent high-security access control. Gams, Matjaz; Tusar, Tea Report Dec 1, 2007 6212
Otherworldly accessibility: each physical or virtual space has characteristics that make it accessible or inaccessible to people depending on their physical abilities. Peters, Tom; Bell, Lori Oct 1, 2007 2024
EU adopts Prum Treaty. Swartz, Nikki Sep 1, 2007 519
UK National archives, Microsoft working to access old file formats. Swartz, Nikki Sep 1, 2007 548
Getting past 'no': responses to 10 common reasons for denying your public records request. Cuillier, David Aug 1, 2007 630
Unify NAC and VPN: like SSL VPNs, a NAC solution can substantially improve on simple password-protected access. Guerrero, Frank Jul 1, 2007 708
CA announces new Application Wizard for CA Single Sign-On. Brief article Jun 21, 2007 166
Convergence: merging access controls. Piazza, Peter Feb 1, 2007 373
Putting muscle into access control: Anytime Fitness is using antitailgating devices at its clubs around the United States to snare uninvited guests. Elliott, Robert Jun 1, 2006 906
e-Government Unit says 97% of websites fail the disabled. Brief Article Nov 30, 2005 262
Sniffing out shelf life? Brief Article Nov 1, 2005 246
Access control. Brief Article Oct 1, 2005 106
Single sign-on application. Brief Article Oct 1, 2005 132
Secure design is now possible. Gonzalez, Maria F. Sep 28, 2005 482
Aventail announces Secure Mobile Access solution for PDAs and smart phones. Brief Article Sep 20, 2005 257
Two Supreme Court rulings impact local governments. Parkhurst, David; Leanza, Cheryl Jul 4, 2005 542
US access control. Brief Article Jun 1, 2005 160
Centralizing card control: find out how one company instituted an enterprisewide card solution for its headquarters office and 40 field offices. Frank, Thomas Jun 1, 2005 2061
JUSTICE AND HOME AFFAIRS: BIOMETRICS NOT A PERFECT SCIENCE, SAYS COMMISSION. Apr 2, 2005 381
Laptops don't have legs. Roberts, Marta Jan 1, 2005 1100
Integrated access control. Brief Article Jan 1, 2005 115
Access control. Brief Article Oct 1, 2004 99
HI SEC launches staff 'Stop and Search' capability. Brief Article Aug 1, 2004 261
Identity, access management. Brief Article Jul 1, 2004 98
Controlling Internet use in the workplace. Taillon, Gregory Jul 1, 2004 677
Access control. Brief Article Jul 1, 2004 105
Buy the numbers: publishers seek special database monopoly protections. Gross, Robin Jul 1, 2004 2395
Wireless security choices. Nelson, Bill Jun 1, 2004 682
Schengen at CPH: following the recent expansion of the EU, the equipment used to handle 'Schengen' passengers is receiving renewed attention. Belen Diaz-Amodia from Kaba Gallenschutz reports on the access control system employed at Copenhagen Kastrup. Diaz-Amodia, Belen Jun 1, 2004 486
Eyes on the prize: new technology options improve access monitoring and control. Morey, Scott May 1, 2004 495
Bewator Group AB acquires Aptus Utvecklings AB and Aptus Elektronik AB. Brief Article Mar 22, 2004 127
Privacy, security, and government Web sites. Pike, George H. Feb 1, 2004 1003
Privacy or security? Ashling, Jim Feb 1, 2004 1526
Access fights in 2004 will require solidarity: SPJ helps consolidate opposition to closed government. Davis, Charles Industry Overview Jan 1, 2004 925
FBI sticks with 100-year disclosure rule. Brief Article Jan 1, 2004 141
Biometric personnel management. Brief Article Nov 1, 2003 156
Key control. Brief Article Nov 1, 2003 135
Digital privacy act to increase security. Wareing, Andrew Nov 1, 2003 553
US electronic access control products & systems demand to reach $7.3 billion in 2007. Oct 30, 2003 494
Seeing is believing: school districts are using high-tech, and low-tech, approaches to make sure students are safe. (Special section: school security). Sausner, Rebecca Cover Story Jul 1, 2003 2267
First phase of HIPAA gets underway; next compliance deadline is Oct. 16. (Front Page). Lieberman, Lisa Author Abstract May 1, 2003 439
HIPAA could hinder office-based research. (Privacy Regulations). Evans, Jeff Apr 15, 2003 565
When visitors become ghosts. (Working Wise). Premo, Rita Apr 1, 2003 1012
Security provisions are next hurdle for HIPAA compliance: start thinking now about technology purchases you'll make in 12-18 months. (Deadline is 2 Years Away). Frieden, Joyce Apr 1, 2003 534
HIPAA privacy rules: It's still not too late. (Get Compliant). Frieden, Joyce Mar 1, 2003 559
Paradise found: a diverse campus is protected with access control technology. (Safety & Security). Rahfaldt, Kim Feb 1, 2003 171
Questions about medical privacy rule answered. (Mid-April Deadline). Peters, Sally Feb 1, 2003 344
New guide answers questions on privacy rule. (HHS Tries to Clear Up Confusion). Peters, Sally Jan 1, 2003 541
Designing a concentric approach to security. (Insiders Outlook). Gillick, Terrence J. Nov 13, 2002 724

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters