Logical access control

In information technology, logical access controls are tools and protocols used for identification, authentication, authorization, and accountability… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1984-2016
02419842016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Dynamic environments pose a challenge for traditional access control models where permissions are granted or revoked merely based… (More)
  • table I
  • figure 1
  • table II
  • table IV
  • table V
Is this relevant?
2014
2014
  • 2014 IT Professional Conference
  • 2014
A logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes… (More)
Is this relevant?
2013
2013
Access control models generally distinguish between physical access control that mediates access to physical resources such as… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2012
2012
Recent advances in biometric technologies coupled with the increased threats in information security has proliferated the… (More)
  • figure 1
Is this relevant?
2011
2011
Logical policy-based access control models are greatly expressive and thus provide the flexibility for administrators to… (More)
  • table 1
Is this relevant?
Review
2010
Review
2010
Location-based access control (LBAC) has been suggested as a means to improve IT security. By `grounding' users and systems to a… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
To achieve the ultimate goal of attribute-based access control (ABAC), a robust architecture for Identity, Credential, and Access… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of… (More)
  • table 7
Is this relevant?
2008
2008
This paper addresses the confidentiality of valuable content while the content is being accessed. Confidentiality threats such as… (More)
  • figure 1
  • table 1
  • figure 2
Is this relevant?
Review
2002
Review
2002
  • 2002
This file is a DRAFT chapter intended to be part of the NIST Computer Security Handbook. The chapters were prepared by different… (More)
Is this relevant?