Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,715,827 papers from all fields of science
Search
Sign In
Create Free Account
Computer access control
In computer security, general access control includes identification, authorization, authentication, access approval, and audit. A more narrow…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Access Control Matrix
Access control list
Authentication
Authorization
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Dynamic Evaluation Model of Cloud Platform User Trust Value Based on Game Theory
Jiangfeng Xu
,
Kaili Guo
,
Yonglin Li
DEStech Transactions on Computer Science and…
2019
Corpus ID: 212897403
Trust value mode is becoming more and more significant in computer access control systems. In this paper, we present a dynamic…
Expand
2016
2016
Design and application of interface circuit of coal mine equipment intelligent management system TCP/IP module
Xingshan Li
,
Jian Lu
2016
Corpus ID: 59362345
Coal mine blasting equipment library intelligent management to regulate store of blasting equipment through real-time monitoring…
Expand
2015
2015
Computer access control method and system based on physical environment perception
朱红松
,
孙利民
,
刘玉红
,
肖松
,
陶冶
2015
Corpus ID: 108381883
The invention relates to a computer access control method and a system based on the condition of the physical operating…
Expand
Review
2015
Review
2015
A Survey on Authentication Techniques and User Recognition
Vyanktesh Dorlikar
,
A. Chandavale
2015
Corpus ID: 21746321
: Today Mobiles, Computer, Laptops, PDAs are becoming widely popular and largely used. The available authentication techniques…
Expand
Review
2009
Review
2009
A Exploratory Study on R & D Strategies in Industrial Technology Security
Hangbae Chang
,
Jonggu Kang
,
Hyuk-jun Kwon
,
I. You
2009
Corpus ID: 5079817
To enhance international competitiveness through the protection of cutting-edge industrial technology, it is essential to…
Expand
2001
2001
Control Policy Choices lngrid
M. Olson
,
Marshall
,
D. Abrams
2001
Corpus ID: 207846040
This paper provides a guide-a road map-for refining a highlevel information dissemination/control policy into an implementable…
Expand
1997
1997
A secure password storage policy
C. Wood
Information Management & Computer Security
1997
Corpus ID: 46338255
Discusses the necessity of computer access control mechanisms, particularly passwords, to protect information. Suggests that many…
Expand
1985
1985
Examination of Retinal Pattern Threshold Levels and Their Possible Effect on Computer Access Control Mechanisms
D. Helle
1985
Corpus ID: 108063322
Abstract : The advent of multi-programming and the proliferation of shared computer systems has increased the need for greater…
Expand
1985
1985
Computer Access Control
T. G. Xydis
1985
Corpus ID: 202791626
A method of controlling a computer (12) system (10) comprising the steps of: disposing a computer (12) in an operating space and…
Expand
1980
1980
Computer Access Control Software
Linda L. Vetter
1980
Corpus ID: 62578643
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE