نتایج جستجو برای: authorized access
تعداد نتایج: 331905 فیلتر نتایج به سال:
OBJECTIVES In this article we present grids as an architecture for medical image processing and health-care networks. We argue that confidential patient data should not be stored unprotected on a grid and explain why access control systems alone do not offer sufficient protection. The objective of our work is to propose a method that complements access control systems on a grid architecture and...
This Article is brought to you for free and open access by the College of Education at DigitalCommons@WayneState. It has been accepted for inclusion in Center for Self-Determination and Transition by an authorized administrator of DigitalCommons@WayneState. Recommended Citation Mason, C., Field, S., & Sawilowsky, S. (2004). Implementation of self-determination activities and student participati...
This Thesis is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Master's Theses by an authorized administrator of Loyola eCommons. For more information, please contact [email protected].
Secret sharing schemes are widely used now a days in various applications, which need more security, trust and reliability. In secret sharing scheme, the secret is divided among the participants and only authorized set of participants can recover the secret by combining their shares. The authorized set of participants are called access structure of the scheme. In Multi-Secret Sharing Scheme (MS...
Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to impr...
Fine-grained access control for relational data defines user authorizations at the tuple level. Role Based Access Control (RBAC) has been proposed for relational data where roles are allowed access to tuples based on the authorized view defined by a selection predicate. During the last few years, extensive research has been conducted in the area of role en gineering. The existing approaches fo...
Systems that are used to process or handle classified or sensitive information must assure individual accountability whenever either a mandatory or discretionary security policy is invoked. Furthermore, to assure accountability the capability must exist for an authorized and competent agent to access and evaluate accountability information by a secure means, within a reasonable amount of time a...
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the ciphertext of a message. It is constructed using bi-linear pairings. Its security is based on the intractability of the computational bilinear Diffie-Hellman problem. The scheme possesses chosen-plaintext security in the ran...
This Article is brought to you for free and open access by the Department of Economics at ODU Digital Commons. It has been accepted for inclusion in Economics Faculty Publications by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. Repository Citation Koch, James V., "The Revolution in Higher Education" (1998). Economics Faculty Pu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید