Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,935,562 papers from all fields of science
Search
Sign In
Create Free Account
Access control
Known as:
Authentication in web
, Access
, Access Control Systems
Expand
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Access structure
Application security
Authentication
Automated information systems security
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Face Recognition System Using Back Propagation Artificial Neural Network
1. G
2012
Corpus ID: 18782980
The problem in face recognition is to find the best match of an unknown image against a database of face models or to determine…
Expand
2011
2011
Towards the semantic and context-aware management of mobile multimedia
Windson Viana
,
A. Miron
,
Bogdan Moisuc
,
J. Gensel
,
M. Villanova-Oliver
,
H. Martin
Multimedia tools and applications
2011
Corpus ID: 10041673
Users of mobile devices can nowadays easily create large quantities of mobile multimedia documents tracing significant events…
Expand
2011
2011
Weaving a Distributed, Semantic Social Network for Mobile Users
Sebastian Tramp
,
Philipp Frischmuth
,
Natanael Arndt
,
Timofey Ermilov
,
S. Auer
Extended Semantic Web Conference
2011
Corpus ID: 14653274
Smartphones, which contain a large number of sensors and integrated devices, are becoming increasingly powerful and fully…
Expand
2009
2009
Robust Location Tag Generation from Noisy Location Data for Security Applications
D. Qiu
,
D. Boneh
,
S. Lo
,
P. Enge
2009
Corpus ID: 17060446
Location-based security service provides authorization of persons or facilities based on their distinctive location information…
Expand
Highly Cited
2006
Highly Cited
2006
Differentiated services for wireless mesh backbone
Hai Jiang
,
W. Zhuang
,
Xuemin Shen
,
A. Abdrabou
,
Ping Wang
IEEE Communications Magazine
2006
Corpus ID: 2711274
This article addresses the quality of service provisioning issues in the wireless mesh backbone for broadband wireless access…
Expand
2005
2005
SafeSMS - end-to-end encryption for SMS
M. Hassinen
Proceedings of the 8th International Conference…
2005
Corpus ID: 37872704
Our main contribution is confidentiality, in- tegrity and authentication in SMS (Short Message Services). We will show how to…
Expand
2005
2005
Security Requirements---A Field Study of Current Practice
John Wilander
,
Jens Gustavsson
2005
Corpus ID: 8833422
The number of security flaws in software is a costly problem. In 2004 more than ten new security vulnerabilities were found in…
Expand
2004
2004
Secret sharing with access structures in a hierarchy
Chinchen Chang
,
Chu-Hsing Lin
,
Wei Lee
,
Pai-Cheng Hwang
18th International Conference on Advanced…
2004
Corpus ID: 5909608
We propose a secret sharing scheme with the property of access structures in a hierarchy. We employ the concept of admission…
Expand
2003
2003
Trust modeling for peer-to-peer based computing systems
Farag Azzedin
,
Muthucumaru Maheswaran
Proceedings International Parallel and…
2003
Corpus ID: 29557781
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership…
Expand
1999
1999
Performance Evaluation of Control Networks : Ethernet ,
Feng‐Li Lian
,
J. Moyne
,
D. Tilbury
1999
Corpus ID: 18131346
1 Introduction The traditional communication architecture for control systems is point-to-point, which has been successfully…
Expand