Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,851,394 papers from all fields of science
Search
Sign In
Create Free Account
Access Control Service
Known as:
ACS
Access Control Service, or Windows Azure Access Control Service (ACS) is a Microsoft-owned cloud-based service that provides an easy way of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
.NET Framework
Authentication
Claims-based identity
Java
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Implementation of traceability using a distributed RFID-based mechanism
J. P. Muñoz-Gea
,
J. Malgosa-Sanahuja
,
P. Manzanares-Lopez
,
J. Sánchez-Aarnoutse
Computers in industry (Print)
2010
Corpus ID: 20721927
2009
2009
The Study on Service Oriented Access Control Model
Jiaju Wu
,
Chuanyu Xi
Second International Conference on Information…
2009
Corpus ID: 16502451
With the fast development of Internet, distributed isomer system increases in double-click. New access control method and…
Expand
2009
2009
A tree key graph design scheme for hierarchical multi-group access control
Han-Seung Koo
,
O. Kwon
,
Sung-Woong Ra
IEEE Communications Letters
2009
Corpus ID: 1238843
A tree key graph design scheme for hierarchical multi-group access control with low communication overhead is presented. A…
Expand
2007
2007
Access Control Policies and Languages in Open Environments
S. Vimercati
,
S. Foresti
,
S. Jajodia
,
P. Samarati
Secure Data Management in Decentralized Systems
2007
Corpus ID: 14478617
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the…
Expand
Review
2007
Review
2007
Web services access control architecture incorporating trust
M. Coetzee
,
J. Eloff
Internet Research
2007
Corpus ID: 10941585
Purpose – This paper seeks to investigate how the concept of a trust level is used in the access control policy of a web services…
Expand
2005
2005
Context-sensitive access control model and implementation
Weili Han
,
Junjing Zhang
,
Xi-Yan Yao
International Conference on Computer and…
2005
Corpus ID: 11848148
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed…
Expand
2005
2005
A Role Engineering Tool for Role-Based Access Control
Mark Strembeck
2005
Corpus ID: 2248656
Like every requirements engineering process, the process of role engineering for role-based access control depends significantly…
Expand
2005
2005
A Heterogeneous Network Access Service Based on PERMIS and SAML
Gabriel López Millán
,
Óscar Cánovas Reverte
,
A. Gómez-Skarmeta
,
S. Otenko
,
D. Chadwick
European Public Key Infrastructure Workshop
2005
Corpus ID: 5454466
The expansion of inter-organizational scenarios based on different authorization schemes involves the development of integration…
Expand
2002
2002
DocML: a digital library of university data
I. Papadakis
,
Vassilios Karakoidas
,
V. Chrissikopoulos
2002
Corpus ID: 62748751
This paper presents DocML, a Web‐based digital library of university data. The goal is to build a system capable of preserving…
Expand
2000
2000
Business Process Driven Framework for Defining an Access Control Service Based on Roles and Rules
R. Chandramouli
2000
Corpus ID: 168707285
Defining an Access Control Service for an enterprise application requires the choice of an access control model and a process for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE