Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,376,789 papers from all fields of science
Search
Sign In
Create Free Account
Logical access control
In information technology, logical access controls are tools and protocols used for identification, authentication, authorization, and accountability…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Access control
Authentication
Authorization
Biometric device
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Logical Access Control
Raymond A. Pompon
2016
Corpus ID: 58092696
When you mention access control, most people’s minds go blank. Those few that understand technology usually think of passwords…
Expand
2015
2015
Modern physical access control systems and privacy protection
Petr Dzurenda
,
J. Hajny
,
V. Zeman
,
K. Vrba
International Conference on Telecommunications…
2015
Corpus ID: 12647240
The paper deals with current state of card based PAC (Physical Access Control) systems, especially their level of security and…
Expand
2011
2011
Biometric recognition: Sensor characteristics and image quality
Salil Prabhakar
,
Alexander Ivanisov
,
A. Jain
IEEE Instrumentation & Measurement Magazine
2011
Corpus ID: 15165735
Biometric recognition, or simply biometrics, refers to recognizing a person based on one or more of his anatomical or behavioral…
Expand
2011
2011
Chapter 3 – Authorization and Access Control
J. Andress
2011
Corpus ID: 196034169
2008
2008
Processing Logical Access Control Command in Computer System
Tsang-Yean Lee
,
Huey-Ming Lee
,
Wuu-Yee Chen
,
Heng-Sheng Chen
J. Digit. Content Technol. its Appl.
2008
Corpus ID: 32055873
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of…
Expand
2006
2006
An Information Security Risk Assessment Model for Public and University Administrators
Victoriano Casas
2006
Corpus ID: 153569579
Review
2005
Review
2005
Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management
C. Steel
,
Ramesh Nagappan
,
Ray Lai
2005
Corpus ID: 60388494
Foreword by Judy Lin. Foreword by Joe Uniejewski. Preface. Acknowledgments. About the Authors. I. INTRODUCTION. 1. Security by…
Expand
2004
2004
Reducing Silicon Fingerprint Sensor Area
Jean-François Mainguet
,
W. Gong
,
Anne Wang
International Conference on Biometric…
2004
Corpus ID: 30900064
Silicon fingerprint sensor cost is proportional to the area of silicon. Sweep sensors have been proposed to replace square…
Expand
Highly Cited
1990
Highly Cited
1990
Specifying discretionary access control policy for distributed systems
J. Moffett
,
M. Sloman
,
K. Twidle
Computer Communications
1990
Corpus ID: 969879
1988
1988
Electronic eavesdropping onto information systems
C. Blatchford
1988
Corpus ID: 61622041
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE