Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,052,304 papers from all fields of science
Search
Sign In
Create Free Account
Context-based access control
Known as:
CBAC
Context-based access control (CBAC) is a feature of firewall software which intelligently filters TCP and UDP packets based on application layer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Broader (3)
Access control
Computer access control
Data security
Access control list
Capability-based security
Computer security model
Deep packet inspection
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
CONTEXT BASED ACCESS CONTROL SYSTEM IN ANDROID SMARTHONES
N. Sunil
,
L. Vincent
,
Joby George
2016
Corpus ID: 51759652
Android users do not have control over the application capabilities once the applications have been granted the requested…
Expand
2016
2016
DRY SLAB AVALANCHE RELEASES INVOLVING DUSTON-SNOW LAYERS IN COLORADO
Zach M. Guy
,
J. Deems
2016
Corpus ID: 53351040
In recent decades, dust-on-snow events are increasing in both frequency and geographic extent in the Western U.S. Although dust…
Expand
2013
2013
Context-based access control for ridesharing service
N. Teslya
,
A. Kashevnik
,
M. Pashkin
14th Conference of Open Innovation Association…
2013
Corpus ID: 7436102
The paper describes a context-based access control model for a ridesharing service. Ridesharing is a shared use of a car by the…
Expand
2013
2013
Context-based access control model for smart space
A. Smirnov
,
A. Kashevnik
,
N. Shilov
,
N. Teslya
International Conference on Cyber Conflict
2013
Corpus ID: 12074642
The smart space is an aggregation of devices, which can share their resources (information and services) and operate in…
Expand
2013
2013
Brain Tumor Segmentation from MRI images and volume calculation of Tumor
A. Kaushik
,
Vandana Sharma
2013
Corpus ID: 17663079
Oncogene causing Cancer is mainly a tumor oriented disorder which has been found in various parts of the body, specialized into…
Expand
2009
2009
A generalized context-based access control model for pervasive environments
José Bringel Filho
,
H. Martin
International Workshop on Security and Privacy in…
2009
Corpus ID: 13364939
Pervasive Computing Environments enable new opportunities for users to share and to access resources anytime and anywhere in a…
Expand
2007
2007
Contexts and Context-Based Access Control
E. Fernández
,
M. Larrondo-Petrie
,
A.E. Escobar
International Conference on Wireless and Mobile…
2007
Corpus ID: 21044732
The increasing diffusion of portable devices and the widespread availability of wireless networks where users live, work and…
Expand
2005
2005
Context-based access control
J. Rubart
Workshop on Multimedia Information Systems
2005
Corpus ID: 17418298
Various use cases require flexible and dynamic access control management. This paper proposes security contexts and affinities…
Expand
Highly Cited
2004
Highly Cited
2004
Context-based access control management in ubiquitous environments
Antonio Corradi
,
R. Montanari
,
Daniela Tibaldi
Third IEEE International Symposium on Network…
2004
Corpus ID: 9723535
Wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning…
Expand
1976
1976
An Empirical Method of Structure-Activity Correlation for Polysubstituted Cyclic Compounds Using Wiswesser Line Notation
G. Adamson
,
D. Bawden
Journal of chemical information and computer…
1976
Corpus ID: 38043832
pp 31-53. (12) E. Meyer, “Topological Search for Classes of Compounds in Large Files-even of Markush Formulas-at Reasonable…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE