Articles with "access control" as a keyword



Photo by arthurbizkit from unsplash

Blockchain‐based access control with k $k$ ‐times tamper resistance in cloud environment

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Intelligent Systems"

DOI: 10.1002/int.22904

Abstract: While cloud computing services such as cloud storage are fairly mature, it remains challenging to design efficient and secure cryptographic schemes to facilitate fine‐grained access control and achieve other features. For example, existing ciphertext‐policy attribute‐based… read more here.

Keywords: blockchain based; control times; based access; access control ... See more keywords
Photo by lensingmyworld from unsplash

FPGA Implementation of Lifting-Based Data Hiding Scheme for Efficient Quality Access Control of Images

Sign Up to like & get
recommendations!
Published in 2019 at "Circuits, Systems, and Signal Processing"

DOI: 10.1007/s00034-018-0893-6

Abstract: AbstractIn this paper, a hardware implementation of a data hiding technique is proposed for efficient quality access control of images using lifting-based discrete wavelet transformation (DWT). Host image is decomposed into n-level wavelet tiles. A… read more here.

Keywords: scheme; implementation; quality; access control ... See more keywords
Photo from wikipedia

Efficient access control system based on aesthetic QR code

Sign Up to like & get
recommendations!
Published in 2017 at "Personal and Ubiquitous Computing"

DOI: 10.1007/s00779-017-1089-y

Abstract: With the explosive growth of smart phones in recent years, QR code is becoming more and more popular. This work presents a new electronic access control system for smart building based on QR code. The… read more here.

Keywords: aesthetic code; access control; control system; code ... See more keywords
Photo by thinkmagically from unsplash

OrBAC from access control model to access usage model

Sign Up to like & get
recommendations!
Published in 2017 at "Applied Intelligence"

DOI: 10.1007/s10489-017-1064-3

Abstract: The purpose based access control model has been proposed recently to restrict the access to the sensitive data which are out of control of their owner. This model can be enforced by ensuring that the… read more here.

Keywords: model; access control; control model; access ... See more keywords
Photo by campaign_creators from unsplash

A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-0863-y

Abstract: WSN-integrated cloud computing (WCC) has become a promising cloud service architecture, in which sensors and mobile devices are utilized as the data collecting and processing nodes for the cloud service model, while cloud servers can… read more here.

Keywords: data access; wsn; fine grained; access control ... See more keywords
Photo from wikipedia

A flexible fine-grained dynamic access control approach for cloud computing environment

Sign Up to like & get
recommendations!
Published in 2021 at "Cluster Computing"

DOI: 10.1007/s10586-020-03196-x

Abstract: As a pioneering surge of ICT technologies, offering computing resources on-demand, the exceptional evolution of Cloud computing has not gone unnoticed by the IT world. At the same time, security stands as a most prior… read more here.

Keywords: cloud; cloud computing; access control; computing environment ... See more keywords
Photo from wikipedia

A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis

Sign Up to like & get
recommendations!
Published in 2021 at "Information Systems Frontiers"

DOI: 10.1007/s10796-021-10167-z

Abstract: Over the past few years, several efforts have been made to enable specification and enforcement of flexible and dynamic access control policies using traditional access control (such as role based access control (RBAC), etc.) and… read more here.

Keywords: heterogeneous access; control policies; access; administrative model ... See more keywords
Photo by mrthetrain from unsplash

A Parser to Support the Definition of Access Control Policies and Rules Using Natural Languages

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Medical Systems"

DOI: 10.1007/s10916-019-1467-2

Abstract: As a consequence of the epidemiological transition towards non-communicable diseases, integrated care approaches are required, not solely focused on medical purposes, but also on a range of essential activities for the maintenance of the individuals’… read more here.

Keywords: control policies; access control; definition access;
Photo from wikipedia

ITrust: identity and trust based access control model for healthcare system security

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-07923-4

Abstract: The patient and healthcare professionals use the Electronic Healthcare System (EHS) for accessing medical records from the remote locations via the Internet. The emerging healthcare system has several advantages such as better management of the… read more here.

Keywords: healthcare; healthcare system; trust; access control ... See more keywords
Photo from wikipedia

Parallel hardware implementation of data hiding scheme for quality access control of grayscale image based on FPGA

Sign Up to like & get
recommendations!
Published in 2020 at "Multidimensional Systems and Signal Processing"

DOI: 10.1007/s11045-019-00650-x

Abstract: Dither modulation is a well-known data hiding technique for the quality access control of the digital image. Sometimes, quality access control demands real-time hardware implementation to achieve low-power consumption, high-speed, and real time processing with… read more here.

Keywords: scheme; access control; quality access;
Photo by jontyson from unsplash

Time division multiple access scheduling strategies for emerging vehicular ad hoc network medium access control protocols: a survey

Sign Up to like & get
recommendations!
Published in 2019 at "Telecommunication Systems"

DOI: 10.1007/s11235-018-00542-8

Abstract: Vehicular ad hoc network (VANET) is an emerging and promising technology, which allows vehicles while moving on the road to communicate and share resources. These resources are aimed at improving traffic safety and providing comfort… read more here.

Keywords: vehicular hoc; time; medium access; access ... See more keywords