Access Control Service

Access Control Service, or Windows Azure Access Control Service (ACS) is a Microsoft-owned cloud-based service that provides an easy way of… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1997-2015
024619972015

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Many initiatives exist that integrate e-health systems on a large scale. One of the main technical challenges is access control… (More)
Is this relevant?
2008
2008
Service overlay networks (SONs) have recently been proposed to support various value-added services including multicast… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
Recently, the RFID (radio frequency identification) technology attracts the world market attention as essential technology for… (More)
  • figure 5
Is this relevant?
2006
2006
Aspect-oriented software development techniques can help modularize the enforcement of application-specific access control… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?
2006
2006
Access control service is a mandatory function in WFMSs. How to apply a suitable access control model to WFMSs is a challenging… (More)
  • figure 1
  • figure 3
  • figure 2
Is this relevant?
2005
2005
Like every requirements engineering process, the process of role engineering for role-based access control depends significantly… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?
2005
2005
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed… (More)
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Separation of duty, as a security principle, has as its primary objective the prevention of fraud and errors. This objective is… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2000
2000
Mobile Code (MC) technologies provide appealing solutions for the development of Internet applications. For instance, Java… (More)
  • figure 1
Is this relevant?
1997
1997
In order for intranets to reach their full potential, access control and authorization management mechanisms must be in place… (More)
  • table 1
  • figure 3
Is this relevant?