نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

Journal: :Methods of information in medicine 2005
L Seitz J-M Pierson L Brunie

OBJECTIVES In this article we present grids as an architecture for medical image processing and health-care networks. We argue that confidential patient data should not be stored unprotected on a grid and explain why access control systems alone do not offer sufficient protection. The objective of our work is to propose a method that complements access control systems on a grid architecture and...

2013
Christine Mason Sharon Field Shlomo Sawilowsky

This Article is brought to you for free and open access by the College of Education at DigitalCommons@WayneState. It has been accepted for inclusion in Center for Self-Determination and Transition by an authorized administrator of DigitalCommons@WayneState. Recommended Citation Mason, C., Field, S., & Sawilowsky, S. (2004). Implementation of self-determination activities and student participati...

2015
William Michael Kelly William Micheal Kelly Ravindra Nanda

This Thesis is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Master's Theses by an authorized administrator of Loyola eCommons. For more information, please contact [email protected].

Journal: :CoRR 2014
V. P. Binu A. Sreekumar

Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the secret by combining their shares. The authorized set of participants are called access structure of the scheme. In Multi-Secret Sharing Scheme (MS...

Journal: :Trans. Emerging Telecommunications Technologies 2013
Amer M. Magableh Redha M. Radaydeh Mohamed-Slim Alouini

Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to impr...

2013
Zahid Pervaiz Arif Ghafoor Walid G. Aref

Fine-grained access control for relational data defines user authorizations at the tuple level. Role Based Access Control (RBAC) has been proposed for relational data where roles are allowed access to tuples based on the authorized view defined by a selection predicate. During the last few years, extensive research has been conducted in the area of role en­ gineering. The existing approaches fo...

2006
Sushil Jajodia Shashi K. Gadia Gautam Bhargava

Systems that are used to process or handle classified or sensitive information must assure individual accountability whenever either a mandatory or discretionary security policy is invoked. Furthermore, to assure accountability the capability must exist for an authorized and competent agent to access and evaluate accountability information by a secure means, within a reasonable amount of time a...

Journal: :I. J. Network Security 2008
Chunxiang Xu Junhui Zhou Guozhen Xiao

A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the ciphertext of a message. It is constructed using bi-linear pairings. Its security is based on the intractability of the computational bilinear Diffie-Hellman problem. The scheme possesses chosen-plaintext security in the ran...

2016
James V. Koch William H. Honan

This Article is brought to you for free and open access by the Department of Economics at ODU Digital Commons. It has been accepted for inclusion in Economics Faculty Publications by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. Repository Citation Koch, James V., "The Revolution in Higher Education" (1998). Economics Faculty Pu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید