Skip to Content

Overview of content related to 'access control'

Syndicate content

This page provides an overview of 3 articles related to 'access control', listing most recently updated content first. Note that filters may be applied to display a sub-set of articles in this category (see FAQs on filtering for usage tips). Select this link to remove all filters.

 'Inspecting article' image: copyright, used under license from shutterstock.com
Access control is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system. (Excerpt from Wikipedia article: Access control)

Key statistics

Metadata related to 'access control' (as derived from all content tagged with this term):

  • Number of articles referring to 'access control': 46 (2.6% of published articles)
  • Total references to 'access control' across all Ariadne articles: 113
  • Average number of references to 'access control' per Ariadne article: 2.46
  • Earliest Ariadne article referring to 'access control': 1996-05
  • Trending factor of 'access control': 72 (see FAQs on monitoring of trends)

See our 'access control' overview for more data and comparisons with other tags. For visualisations of metadata related to timelines, bands of recency, top authors, and and overall distribution of authors using this term, see our 'access control' usage charts. Usage chart icon

Top authors

Ariadne contributors most frequently referring to 'access control':

  1. peri stracchino (see articles on this topic by this author)
  2. yankui feng (see articles on this topic by this author)
  3. jason cooper (see articles on this topic by this author)
  4. gary brewerton (see articles on this topic by this author)
  5. dennis nicholson (see articles on this topic by this author)

Note: Links to all articles by authors listed above set filters to display articles by each author in the overview below. Select this link to remove all filters.

Titlesort icon Article summary Date

5 Step Guide to Becoming a Content Provider in the JISC Information Environment

Andy Powell describes steps which content providers can take to integrate their resources into the JISC IE.

October 2002, issue33, feature article

Controlling Access in the Electronic Library

Andy Powell and Mark Gillet discuss methods of electronic authentication.

January 1997, issue7, tooled up

Performance and Security: Notes for System Administrators

Performance and Security - Notes for System Administrators: Andy Powell offers some hints and tips on the performance and security aspects of running electronic library services on UNIX based machines.

March 1997, issue8, tooled up

CSVXML
Syndicate content


by Dr. Radut