Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,084,880 papers from all fields of science
Search
Sign In
Create Free Account
Computer access control
In computer security, general access control includes identification, authorization, authentication, access approval, and audit. A more narrow…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Access Control Matrix
Access control list
Authentication
Authorization
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Design and application of interface circuit of coal mine equipment intelligent management system TCP/IP module
Xingshan Li
,
Jian Lu
2016
Corpus ID: 59362345
Coal mine blasting equipment library intelligent management to regulate store of blasting equipment through real-time monitoring…
Expand
2016
2016
Design and Application of Alarm Light Circuit for Intelligent Management System of Coal Mine Equipment
Xingshan Li
,
Jian Lu
2016
Corpus ID: 111370618
The intelligent management of the coal mine blasting equipment storehouse can regulate the storage of the explosive material by…
Expand
2010
2010
Known User Continuous Authentication System for Consumer Application Software
Ines Brosso
,
G. Bressan
,
W. Ruggiero
7th IEEE Consumer Communications and Networking…
2010
Corpus ID: 17346330
This paper presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a…
Expand
2010
2010
Known User Continuous Authentication System
Ines Brosso
,
Fernando Ferreira
,
G. Bressan
,
W. Ruggiero
7th IEEE Consumer Communications and Networking…
2010
Corpus ID: 18999972
This work presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a continuous…
Expand
2009
2009
Time-sensitive access control model in P2P networks
Junqing Li
,
Shengxian Xie
,
Q. Pan
,
Huan Li
,
Yuting Wang
IEEE Pacific-Asia Workshop on Computational…
2009
Corpus ID: 18195977
Peer-to-peer (P2P) networks have attracted more and more attentions in recent years. The access control model is very important…
Expand
2001
2001
Control Policy Choices lngrid
M. Olson
,
Marshall
,
D. Abrams
2001
Corpus ID: 207846040
This paper provides a guide-a road map-for refining a highlevel information dissemination/control policy into an implementable…
Expand
Review
1996
Review
1996
Access Control Systems: From Host-Centric to Network-Centric Computing
M. Benantar
,
Richard L. Guski
,
Kathleen M. Troidle
IBM Systems Journal
1996
Corpus ID: 5129974
In this paper, we review the important theoretical models of computer access control systems. Using the IBM Multiple Virtual…
Expand
1994
1994
Integrating physical and computer access control systems
J. Smith
,
R. Charland
Proceedings of IEEE International Carnahan…
1994
Corpus ID: 62057592
Current systems for controlling access to buildings and to computers use the same basic ideas, but do not work together…
Expand
1985
1985
Examination of Retinal Pattern Threshold Levels and Their Possible Effect on Computer Access Control Mechanisms
D. Helle
1985
Corpus ID: 108063322
Abstract : The advent of multi-programming and the proliferation of shared computer systems has increased the need for greater…
Expand
1985
1985
Computer Access Control
T. G. Xydis
1985
Corpus ID: 202791626
A method of controlling a computer (12) system (10) comprising the steps of: disposing a computer (12) in an operating space and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE