Skip to search formSkip to main contentSkip to account menu

Access control

Known as: Authentication in web, Access, Access Control Systems 
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services… 
Highly Cited
2006
Highly Cited
2006
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at… 
Highly Cited
2005
Highly Cited
2005
  • A. Matheus
  • Proceedings of the 38th Annual Hawaii…
  • 2005
  • Corpus ID: 13358818
Web Services, as the new building blocks of today's Internet provide the power to access distributed and heterogeneous… 
Highly Cited
2004
Highly Cited
2004
This paper proposes S-MAC, a medium access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks… 
Highly Cited
2003
Highly Cited
2003
The traffic-adaptive medium access protocol (TRAMA) is introduced for energy-efficient collision-free channel access in wireless… 
Highly Cited
2001
Highly Cited
2001
Although several access control policies can be devised for controlling access to information, all existing authorization models… 
Highly Cited
2000
Highly Cited
2000
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the… 
Highly Cited
1999
Highly Cited
1999
The medium access control (MAC) and physical characteristics for wireless local area networks (LANs) are specified in this… 
Highly Cited
1997
Highly Cited
1997
services are specified here by describing the service primitives and parameters that characterize each service. This definition… 
Review
1996
Review
1996
Security administration of large systems is complex, but it can be simplified by a role-based access control approach. This…