Access control list

Known as: Ace (disambiguation), Access Control Entry, Access control lists 
An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Attribute-based access control (ABAC) is a promising alternative to traditional models of access control (i.e., discretionary… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
2015
2015
Attribute-based access control (ABAC) provides a high level of flexibility that promotes security and information sharing. ABAC… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Recently, there has been considerable interest in attribute based access control (ABAC) to overcome the limitations of the… (More)
  • table 1
  • figure 1
  • table 4
  • table 5
  • table 6
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Grid systems have huge and changeable user groups, and different autonomous domains always have different security policies. The… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by… (More)
  • table 1
  • table 3
  • table 4
  • table 2
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Multiuser diversity refers to a type of diversity present across different users in a fading environment. This diversity can be… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2001
2001
It is a challenging task for network administrators to correctly implement corporate security policies in a large network… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1998
Highly Cited
1998
In packet radio networks, hidden terminal problem and exposed terminal problem can severely reduce the utilization of a Medium… (More)
  • figure 3
  • figure 5
Is this relevant?
1998
1998
This diploma-thesis analyses ho w to process Access Control Lists (ACLs) in hardware at wirespeed using Content Addressable… (More)
  • figure 3
  • figure 5
  • figure 6
  • figure 7
  • figure 8
Is this relevant?
Highly Cited
1996
Highly Cited
1996
This article introduces a family of reference models for rolebased access control (RBAC) in which permissions are associated with… (More)
  • figure 1
  • figure 4
Is this relevant?