Skip to search formSkip to main contentSkip to account menu

Computer access control

In computer security, general access control includes identification, authorization, authentication, access approval, and audit. A more narrow… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Coal mine blasting equipment library intelligent management to regulate store of blasting equipment through real-time monitoring… 
2016
2016
The intelligent management of the coal mine blasting equipment storehouse can regulate the storage of the explosive material by… 
2010
2010
This paper presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a… 
2010
2010
This work presents KUCAS (Known User Continuous Authentication System), a work-in-progress security system, that has a continuous… 
2009
2009
Peer-to-peer (P2P) networks have attracted more and more attentions in recent years. The access control model is very important… 
2001
2001
This paper provides a guide-a road map-for refining a highlevel information dissemination/control policy into an implementable… 
Review
1996
Review
1996
In this paper, we review the important theoretical models of computer access control systems. Using the IBM Multiple Virtual… 
1994
1994
Current systems for controlling access to buildings and to computers use the same basic ideas, but do not work together… 
1985
1985
Abstract : The advent of multi-programming and the proliferation of shared computer systems has increased the need for greater… 
1985
1985
A method of controlling a computer (12) system (10) comprising the steps of: disposing a computer (12) in an operating space and…