Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Access Control Service

Known as: ACS 
Access Control Service, or Windows Azure Access Control Service (ACS) is a Microsoft-owned cloud-based service that provides an easy way of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
G3-PLC technology is the new generation technical specification, which has many advantages such as low rate, high reliability and… Expand
  • table 4-2
  • table 4-1
Highly Cited
2016
Highly Cited
2016
In smart city, all kinds of users' data are stored in electronic devices to make everything intelligent. A smartphone is the most… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
2010
2010
In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main… Expand
  • figure 1
2009
2009
A tree key graph design scheme for hierarchical multi-group access control with low communication overhead is presented. A… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2007
2007
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the… Expand
  • figure 2
  • figure 4
  • figure 5
  • figure 6
  • figure 7
2006
2006
Recently, the RFID (radio frequency identification) technology attracts the world market attention as essential technology for… Expand
  • figure 5
2002
2002
This paper presents DocML, a Web‐based digital library of university data. The goal is to build a system capable of preserving… Expand
  • figure 1
  • figure 2
  • figure 8
Highly Cited
2001
Highly Cited
2001
Separation of duty, as a security principle, has as its primary objective the prevention of fraud and errors. This objective is… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
2000
2000
Mobile code (MC) technologies provide appealing solutions for the development of Internet applications. For instance, Java… Expand
  • figure 1
Highly Cited
1995
Highly Cited
1995
The integration of autonomous information systems causes a fundamental problem for security management. How to ensure a… Expand
  • figure 1
  • figure 2