Skip to search formSkip to main contentSkip to account menu

Access control

Known as: Authentication in web, Access, Access Control Systems 
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Data access control is an effective way to ensure data security in the cloud. However, due to data outsourcing and untrusted… 
Highly Cited
2012
Highly Cited
2012
We can now outsource data backups off-site to third-party cloud storage services so as to reduce data management costs. However… 
Highly Cited
2011
Highly Cited
2011
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates… 
Highly Cited
2010
Highly Cited
2010
Online personal health record (PHR) enables patients to manage their own medical records in a centralized way, which greatly… 
Highly Cited
2009
Highly Cited
2009
UnderWater Acoustic Sensor Networks (UW-ASNs) consist of sensors and Autonomous Underwater Vehicles (AUVs) performing… 
Highly Cited
2006
Highly Cited
2006
Wireless Sensor Networks (WSN) are mainly characterized by dense deployment of sensor nodes which collectively transmit… 
Highly Cited
2006
Highly Cited
2006
-Cloud computing is the new computing paradigm that has influenced the way computing takes places in the recent past. This… 
Highly Cited
2005
Highly Cited
2005
Balancing the competing goals of collaboration and security is a difficult, multidimensional problem. Collaborative systems often… 
Highly Cited
2005
Highly Cited
2005
Web Services, as the new building blocks of today's Internet provide the power to access distributed and heterogeneous… 
Highly Cited
2002
Highly Cited
2002
In ad hoc networks, the hidden- and the exposed-terminal problems can severely reduce the network capacity on the MAC layer. To…