نتایج جستجو برای: unauthorized access
تعداد نتایج: 329692 فیلتر نتایج به سال:
The Access control mechanism avoids the unauthorized access of sensitive information. It protects the user information from the unauthorized access. The Protected protection mechanism is a much important concern in the case of sharing the sensitive information. The Protected protection mechanism provides better Protected for the sensitive information which is to be shared. The generally used Pr...
The importance of information as a main asset of a company or organization is widely acknowledged nowadays. The loss of or the unauthorized access to sensitive information are critical and can possibly send a company into bankruptcy. Furthermore, the risk of information larceny is most often not caused by a direct attack of unauthorized outsiders, but by authorized extractions by malicious or u...
The intrusion detection problem is becoming a challenging task due to the proliferation of heterogeneous computer networks since the increased connectivity of computer systems gives greater access to outsiders and makes it easier for intruders to avoid identification [1]. Intrusion detection systems are used to detect unauthorized access to a computer system. A number of soft computing based ap...
As science communities and commercial organisations increasingly exploit XML as a means of exchanging and disseminating information, the selective exposure of information in XML has become an important issue. In this paper, we present a novel XML security framework developed to enforce a generic, flexible access-control mechanism for XML data management, which supports efficient and secure quer...
In this paper, we present an RCACM coordination model for mobile computing applications based on mobile agents. The key idea in RCACM is the role-based context-awareness hierarchical coordination model. In this model, local programmable reactive tuple space is introduced to address the contextaware coordination problems and hierarchical distributed tuples can make agents dynamically acquire inf...
This paper documents the BitLocker Drive Encryption system included with some versions of Microsoft’s Windows Vista. In particular it describes the key management system, the algorithms and modes used, and the metadata format. Particular attention is given to methods forensic examiners can use to access protected data. There are some unanswered questions about how the cryptosystem operates, inc...
The explosive growth in wireless networks over the last few years resembles the rapid growth of the Internet within the last decade. During the beginning of the commercialization of the Internet, organizations and individuals connected without concern for the security of their system or network. Over time, it became apparent that some form of security was required to prevent outsiders from expl...
A common definition of computer security is: ” a system is secure if it adequately protects information that it processes against unauthorized disclosure, unauthorized modification, and unauthorized withholding (denial of service).” Currently, no systems can assure all of these. The first major efforts on such a system is the so called mandatory access control (MAC). It is for military security...
OBJECTIVES In medical institutions, unauthorized access points and terminals obstruct the stable operation of a large-scale wireless local area network (LAN) system. By establishing a real-time monitoring method to detect such unauthorized wireless devices, we can improve the efficiency of security management. METHODS We detected unauthorized wireless devices by using a centralized wireless L...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید