Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,984,620 papers from all fields of science
Search
Sign In
Create Free Account
Logical access control
In information technology, logical access controls are tools and protocols used for identification, authentication, authorization, and accountability…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Access control
Authentication
Authorization
Biometric device
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Logical Access Control
Raymond A. Pompon
2016
Corpus ID: 58092696
When you mention access control, most people’s minds go blank. Those few that understand technology usually think of passwords…
Expand
2015
2015
Modern physical access control systems and privacy protection
Petr Dzurenda
,
J. Hajny
,
V. Zeman
,
K. Vrba
International Conference on Telecommunications…
2015
Corpus ID: 12647240
The paper deals with current state of card based PAC (Physical Access Control) systems, especially their level of security and…
Expand
2014
2014
A Tag-Based, Logical Access-Control Framework for Personal File Sharing
Michelle L. Mazurek
2014
Corpus ID: 59914781
People store and share ever-increasing numbers of digital documents, photos, and other files, both on personal devices and within…
Expand
2011
2011
Chapter 3 – Authorization and Access Control
J. Andress
2011
Corpus ID: 196034169
2008
2008
Processing Logical Access Control Command in Computer System
Tsang-Yean Lee
,
Huey-Ming Lee
,
Wuu-Yee Chen
,
Heng-Sheng Chen
J. Digit. Content Technol. its Appl.
2008
Corpus ID: 32055873
Access control includes physical and logical access control. Physical access control protects the damage, theft and losing of…
Expand
2007
2007
Protecting Network Resources
R. Alder
,
Josh Burke
,
C. Keefer
,
A. Orebaugh
,
Larry Pesce
,
Eric S. Seagren
2007
Corpus ID: 168803237
2004
2004
Combining Logical and Physical Access Control for Smart Environments
Kristine Frank
,
Ida C. Willemoes-Wissing
2004
Corpus ID: 108063279
Traditional access control models only protect logical entities within the computer (such as les and memory) and not information…
Expand
2003
2003
Secure identity authentication and logical access control for airport information systems
M. David
,
G. Hussein
,
K. Sakurai
IEEE 37th Annual International Carnahan…
2003
Corpus ID: 60926497
We propose identity authentication by using a contactless smart card (CSC) with multiple biometric features for secure logical…
Expand
1996
1996
Security service level agreements for outsourced security functions
B. Pepper
Information Security Technical Report
1996
Corpus ID: 206129377
1988
1988
Electronic eavesdropping onto information systems
C. Blatchford
1988
Corpus ID: 61622041
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE