Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,291,051 papers from all fields of science
Search
Sign In
Create Free Account
Access Control Service
Known as:
ACS
Access Control Service, or Windows Azure Access Control Service (ACS) is a Microsoft-owned cloud-based service that provides an easy way of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
.NET Framework
Authentication
Claims-based identity
Java
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Privacy Protection for Preventing Data Over-Collection in Smart City
Yibin Li
,
Wenyun Dai
,
Zhong Ming
,
Meikang Qiu
IEEE transactions on computers
2016
Corpus ID: 12968857
In smart city, all kinds of users' data are stored in electronic devices to make everything intelligent. A smartphone is the most…
Expand
2016
2016
Application research of the power line carrier communication multiband based on G3 technology
Ping Hu
,
Shi Peng
,
Chengmin Wang
,
Huicong Fan
,
Rong-Zuo Lin
,
Yong Liu
International Conference on Systems and…
2016
Corpus ID: 18407535
G3-PLC technology is the new generation technical specification, which has many advantages such as low rate, high reliability and…
Expand
Highly Cited
2016
Highly Cited
2016
Security Issues in Service Model of Cloud Computing Environment
B. H. Krishna
,
S. Kiran
,
G. Murali
,
R. Reddy
2016
Corpus ID: 57153357
2010
2010
Implementation of traceability using a distributed RFID-based mechanism
J. P. Muñoz-Gea
,
J. Malgosa-Sanahuja
,
P. Manzanares-Lopez
,
J. Sánchez-Aarnoutse
Computers in industry (Print)
2010
Corpus ID: 20721927
2007
2007
Access Control Policies and Languages in Open Environments
S. Vimercati
,
S. Foresti
,
S. Jajodia
,
P. Samarati
Secure Data Management in Decentralized Systems
2007
Corpus ID: 14478617
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the…
Expand
Review
2007
Review
2007
Web services access control architecture incorporating trust
M. Coetzee
,
J. Eloff
Internet Research
2007
Corpus ID: 10941585
Purpose – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services…
Expand
2006
2006
The RFID middleware system supporting context-aware access control service
Jieun Song
,
Howon Kim
8th International Conference Advanced…
2006
Corpus ID: 7796096
Recently, the RFID (radio frequency identification) technology attracts the world market attention as essential technology for…
Expand
2005
2005
Context-sensitive access control model and implementation
Weili Han
,
Junjing Zhang
,
Xi-Yan Yao
International Conference on Computer and…
2005
Corpus ID: 11848148
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed…
Expand
2000
2000
A flexible access control service for Java mobile code
Antonio Corradi
,
R. Montanari
,
C. Stefanelli
,
Emil C. Lupu
,
M. Sloman
Asia-Pacific Computer Systems Architecture…
2000
Corpus ID: 13812547
Mobile code (MC) technologies provide appealing solutions for the development of Internet applications. For instance, Java…
Expand
Highly Cited
1995
Highly Cited
1995
Argos - A Configurable Access Control System for Interoperable Environments
Dirk Jonscher
,
K. Dittrich
Database Security
1995
Corpus ID: 9307030
The integration of autonomous information systems causes a fundamental problem for security management. How to ensure a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE