Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 206,206,024 papers from all fields of science
Search
Sign In
Create Free Account
Access control
Known as:
Authentication in web
, Access
, Access Control Systems
Expand
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
49 relations
Access structure
Application security
Authentication
Automated information systems security
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
Shucheng Yu
,
Cong Wang
,
K. Ren
,
W. Lou
Proceedings IEEE INFOCOM
2010
Corpus ID: 944545
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services…
Expand
Highly Cited
2006
Highly Cited
2006
Attribute-based encryption for fine-grained access control of encrypted data
Vipul Goyal
,
Omkant Pandey
,
A. Sahai
,
Brent Waters
CCS '06
2006
Corpus ID: 5131034
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at…
Expand
Highly Cited
2005
Highly Cited
2005
How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML)
A. Matheus
Proceedings of the 38th Annual Hawaii…
2005
Corpus ID: 13358818
Web Services, as the new building blocks of today's Internet provide the power to access distributed and heterogeneous…
Expand
Highly Cited
2004
Highly Cited
2004
Medium access control with coordinated adaptive sleeping for wireless sensor networks
W. Ye
,
J. Heidemann
,
D. Estrin
IEEE/ACM Transactions on Networking
2004
Corpus ID: 1344843
This paper proposes S-MAC, a medium access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks…
Expand
Highly Cited
2003
Highly Cited
2003
Energy-efficient collision-free medium access control for wireless sensor networks
V. Rajendran
,
K. Obraczka
,
J. Garcia-Luna-Aceves
SenSys '03
2003
Corpus ID: 2984777
The traffic-adaptive medium access protocol (TRAMA) is introduced for energy-efficient collision-free channel access in wireless…
Expand
Highly Cited
2001
Highly Cited
2001
Flexible support for multiple access control policies
S. Jajodia
,
P. Samarati
,
M. Sapino
,
V. S. Subrahmanian
TODS
2001
Corpus ID: 15154736
Although several access control policies can be devised for controlling access to information, all existing authorization models…
Expand
Highly Cited
2000
Highly Cited
2000
Access Control: Policies, Models, and Mechanisms
P. Samarati
,
S. Vimercati
FOSAD
2000
Corpus ID: 9720393
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the…
Expand
Highly Cited
1999
Highly Cited
1999
Wireless lan medium access control (mac) and physical layer (phy) specifications
V. Phua
1999
Corpus ID: 53821787
The medium access control (MAC) and physical characteristics for wireless local area networks (LANs) are specified in this…
Expand
Highly Cited
1997
Highly Cited
1997
Wireless lan medium access control (mac) and physical layer (phy) specifications
A. Abdullah
1997
Corpus ID: 54164102
services are specified here by describing the service primitives and parameters that characterize each service. This definition…
Expand
Review
1996
Review
1996
Role-Based Access Control Models
R. Sandhu
,
E. Coyne
,
H. Feinstein
,
C. E. Youman
Computer
1996
Corpus ID: 1958270
Security administration of large systems is complex, but it can be simplified by a role-based access control approach. This…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE