Access control

Known as: Access control protocol, Access policy, Subject 
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1944-2017
05001000150019442016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper proposes S-MAC, a medium access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Although several access control policies can be devised for controlling access to information, all existing authorization models… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We study the problem of media access control in the novel regime of sensor networks, where unique application behavior and tight… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Role-based access control (RBAC) models are receiving increasing attention as a generalized approach to access control. Roles may… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Using directional antennas can be beneficial for wireless ad hoc networks consisting of a collection of wireless hosts. To best… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
This article introduces a family of reference models for rolebased access control (RBAC) in which permissions are associated with… (More)
  • figure 1
  • figure 4
Is this relevant?
Highly Cited
1991
Highly Cited
1991
We study some of the concepts, protocols, and algorithms for access control in distributed systems, from a logical perspective… (More)
Is this relevant?