Skip to search formSkip to main contentSkip to account menu

Computer access control

In computer security, general access control includes identification, authorization, authentication, access approval, and audit. A more narrow… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Trust value mode is becoming more and more significant in computer access control systems. In this paper, we present a dynamic… 
2016
2016
Coal mine blasting equipment library intelligent management to regulate store of blasting equipment through real-time monitoring… 
2015
2015
The invention relates to a computer access control method and a system based on the condition of the physical operating… 
Review
2015
Review
2015
: Today Mobiles, Computer, Laptops, PDAs are becoming widely popular and largely used. The available authentication techniques… 
Review
2009
Review
2009
To enhance international competitiveness through the protection of cutting-edge industrial technology, it is essential to… 
2001
2001
This paper provides a guide-a road map-for refining a highlevel information dissemination/control policy into an implementable… 
1997
1997
Discusses the necessity of computer access control mechanisms, particularly passwords, to protect information. Suggests that many… 
1985
1985
Abstract : The advent of multi-programming and the proliferation of shared computer systems has increased the need for greater… 
1985
1985
A method of controlling a computer (12) system (10) comprising the steps of: disposing a computer (12) in an operating space and…