Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,217,434 papers from all fields of science
Search
Sign In
Create Free Account
Access control
Known as:
Authentication in web
, Access
, Access Control Systems
Expand
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Access structure
Application security
Authentication
Automated information systems security
Expand
Broader (1)
Identity management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Person identification in surveillance video using gait biometric cues
Emdad Hossain
,
G. Chetty
International Conference on Fuzzy Systems and…
2012
Corpus ID: 37004173
In this paper, we proposed a novel approach for establishing person identity based on gait cues in surveillance videos using…
Expand
Highly Cited
2010
Highly Cited
2010
Sequential cooperative sensing for multi-channel cognitive radios
Seung-Jun Kim
,
G. Giannakis
IEEE International Conference on Acoustics…
2010
Corpus ID: 10432893
sequential cooperative spectrum sensing algorithm is developed for multi-channel cognitive radio (CR) systems. Each CR quantizes…
Expand
Highly Cited
2007
Highly Cited
2007
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Tingjian Ge
,
S. Zdonik
IEEE International Conference on Data Engineering
2007
Corpus ID: 181019
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of…
Expand
Highly Cited
2006
Highly Cited
2006
Differentiated services for wireless mesh backbone
Hai Jiang
,
W. Zhuang
,
Xuemin Shen
,
A. Abdrabou
,
Ping Wang
IEEE Communications Magazine
2006
Corpus ID: 2711274
This article addresses the quality of service provisioning issues in the wireless mesh backbone for broadband wireless access…
Expand
2006
2006
Prospectus of mobile TV: Another bubble or killer application?
Donghee Don Shin
Telematics and informatics
2006
Corpus ID: 9910020
Highly Cited
2005
Highly Cited
2005
Performance of ad hoc routing using directional antennas
Romit Roy Choudhury
,
N. Vaidya
Ad hoc networks
2005
Corpus ID: 16264009
Highly Cited
2005
Highly Cited
2005
On the Correctness of Operating System Kernels
M. Gargano
,
Mark A. Hillebrand
,
Dirk Leinenbach
,
W. Paul
International Conference on Theorem Proving in…
2005
Corpus ID: 13100398
The Verisoft project aims at the pervasive formal verification of entire computer systems. In particular, the seamless…
Expand
Highly Cited
2000
Highly Cited
2000
Grid Resource Management, Scheduling and Computational Economy
R. Buyya
,
D. Abramson
,
J. Giddy
2000
Corpus ID: 62983263
This paper identifies the issues in resource management and scheduling in the emerging grid computing context and briefly…
Expand
Highly Cited
1999
Highly Cited
1999
Cycle time properties of the PROFIBUS timed-token protocol
E. Tovar
,
F. Vasques
Computer Communications
1999
Corpus ID: 14734569
Highly Cited
1998
Highly Cited
1998
Balanced media access methods for wireless networks
Timucin Ozugura
,
Mahmoud Naghshinehb
,
Parviz Kermanib
,
Michael Olsen
,
Babak Rezvanib
,
J. Copeland
ACM/IEEE International Conference on Mobile…
1998
Corpus ID: 994057
Fairness algorithms and access methods enable non-zero channel access for wireless communication systems operating in a random…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE