Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Access Control Service

Known as: ACS 
Access Control Service, or Windows Azure Access Control Service (ACS) is a Microsoft-owned cloud-based service that provides an easy way of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Recently, security and privacy have been one of the main concerns that impedes the development of vehicular ad hoc networks… Expand
Is this relevant?
2012
2012
With the rapid application of service-oriented technologies, service and data outsourcing has become a practical and useful… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 6
  • table 1
Is this relevant?
2007
2007
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the… Expand
  • figure 2
  • figure 4
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
2006
2006
Recently, the RFID (radio frequency identification) technology attracts the world market attention as essential technology for… Expand
  • figure 5
Is this relevant?
2005
2005
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed… Expand
  • figure 2
  • figure 3
Is this relevant?
2003
2003
The telecommunication industry traditionally uses clusters to meet its carrier-class requirements of high availability and… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Separation of duty, as a security principle, has as its primary objective the prevention of fraud and errors. This objective is… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2000
2000
Mobile code (MC) technologies provide appealing solutions for the development of Internet applications. For instance, Java… Expand
  • figure 1
Is this relevant?
1997
1997
In order for intranets to reach their full potential, access control and authorization management mechanisms must be in place… Expand
  • table 1
  • figure 3
Is this relevant?
1995
1995
The integration of autonomous information systems causes a fundamental problem for security management. How to ensure a… Expand
  • figure 1
  • figure 2
Is this relevant?