Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,218,479 papers from all fields of science
Search
Sign In
Create Free Account
Access control
Known as:
Authentication in web
, Access
, Access Control Systems
Expand
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Access structure
Application security
Authentication
Automated information systems security
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems
Kan Yang
,
X. Jia
,
K. Ren
,
Bo Zhang
IEEE Transactions on Information Forensics and…
2013
Corpus ID: 2988794
Data access control is an effective way to ensure data security in the cloud. However, due to data outsourcing and untrusted…
Expand
Highly Cited
2012
Highly Cited
2012
Secure Overlay Cloud Storage with Access Control and Assured Deletion
Yang Tang
,
P. Lee
,
John C.S. Lui
,
R. Perlman
IEEE Transactions on Dependable and Secure…
2012
Corpus ID: 12973252
We can now outsource data backups off-site to third-party cloud storage services so as to reduce data management costs. However…
Expand
Highly Cited
2011
Highly Cited
2011
Relationship-based access control: protection model and policy language
Philip W. L. Fong
Conference on Data and Application Security and…
2011
Corpus ID: 7962495
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates…
Expand
Highly Cited
2010
Highly Cited
2010
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings
Ming Li
,
Shucheng Yu
,
K. Ren
,
Wenjing Lou
Security and Privacy in Communication Networks
2010
Corpus ID: 1151322
Online personal health record (PHR) enables patients to manage their own medical records in a centralized way, which greatly…
Expand
Highly Cited
2009
Highly Cited
2009
A CDMA-based Medium Access Control for UnderWater Acoustic Sensor Networks
D. Pompili
,
T. Melodia
,
I. Akyildiz
IEEE Transactions on Wireless Communications
2009
Corpus ID: 14198629
UnderWater Acoustic Sensor Networks (UW-ASNs) consist of sensors and Autonomous Underwater Vehicles (AUVs) performing…
Expand
Highly Cited
2006
Highly Cited
2006
Spatial correlation-based collaborative medium access control in wireless sensor networks
M. Vuran
,
I. Akyildiz
IEEE/ACM Transactions on Networking
2006
Corpus ID: 10186907
Wireless Sensor Networks (WSN) are mainly characterized by dense deployment of sensor nodes which collectively transmit…
Expand
Highly Cited
2006
Highly Cited
2006
HASBE: A HIERARCHICAL ATTRIBUTE-BASED SOLUTION FOR FLEXIBLE AND SCALABLE ACCESS CONTROL IN CLOUD COMPUTING
M V Patil
,
A. S. Babu
2006
Corpus ID: 17994085
-Cloud computing is the new computing paradigm that has influenced the way computing takes places in the recent past. This…
Expand
Highly Cited
2005
Highly Cited
2005
Access control in collaborative systems
William J. Tolone
,
Gail-Joon Ahn
,
Tanusree Pai
,
Seng-phil Hong
CSUR
2005
Corpus ID: 10023805
Balancing the competing goals of collaboration and security is a difficult, multidimensional problem. Collaborative systems often…
Expand
Highly Cited
2005
Highly Cited
2005
How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML)
A. Matheus
Proceedings of the Annual Hawaii International…
2005
Corpus ID: 13358818
Web Services, as the new building blocks of today's Internet provide the power to access distributed and heterogeneous…
Expand
Highly Cited
2002
Highly Cited
2002
Dual busy tone multiple access (DBTMA)-a multiple access control scheme for ad hoc networks
Z. Haas
,
Jing Deng
IEEE Transactions on Communications
2002
Corpus ID: 18508798
In ad hoc networks, the hidden- and the exposed-terminal problems can severely reduce the network capacity on the MAC layer. To…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE