نتایج جستجو برای: unauthorized access

تعداد نتایج: 329692  

Journal: :I. J. Network Security 2017
Wan-Yu Chao Cheng-Yi Tsai Min-Shiang Hwang

Now, most institutions share the data through the Internet. With the rapid development of the Internet and the cloud storage, data-sharing becomes so easy that the data was stolen or destroyed easier than before. Therefore, accessing data should strictly control to avoid unauthorized access. In this paper, we propose the more efficient key management scheme for hierarchical access control than ...

2009
Junping Sun

As computer and other technologies advance and various data and information are pervasively available, preservation of private information embedded in volume data are facing more and more challenges than ever before. Although there are available mechanisms in database management systems limiting access to some sensitive and private information, some inference techniques might still be able to b...

Journal: :journal of computer and robotics 0
mohammad mehdi gilanian sadeghi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

the computer industry has defined the ieee 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. as the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. ieee 802.16e uses multica...

2001
Steve Barker Arnon Rosenthal

We show how a wide variety of role-based access control policies may be formally specified in the stratified subset of clause form logic. We then show how these formal specifications may be automatically translated into a small subset of SQL to be used to seamlessly protect a relational database from unauthorized read and update requests made by authenticated users. We demonstrate the power of ...

2003
Peng Li Yun Mao Steve Zdancewic

Information integrity policies are traditionally enforced by access control mechanisms that prevent unauthorized users from modifying data. However, access control does not provide end-to-end assurance of integrity. For that reason, integrity guarantees in the form of noninterference assertions have been proposed. Despite the appeals of such information-flow based approaches to integrity, that ...

2006
Levent Ertaul Basar Kasim

Mobility of users, transmission of signals through open-air, the requirement of low power consumption by mobile users and smaller data storage area limitation in mobile equipment make mobile wireless networks more vulnerable to security threats like eavesdropping and unauthorized access. This paper proposes a new set of security protocols to enhance the access and data security features of GSM ...

2011
Zhuowei Bao Susan B. Davidson Tova Milo

In this paper we propose a fine-grained workflow model, based on context-free graph grammars, in which the dependency relation between the inputs and outputs of a module is explicitly specified as a bipartite graph. Using this model, we develop an access control mechanism that supports provenance-aware security views. Our security model not only protects sensitive data and modules from unauthor...

Journal: :Journal of the American Medical Informatics Association : JAMIA 2002
Daniel R. Masys Dixie B. Baker Amy Butros Kevin E. Cowles

OBJECTIVE The Patient-Centered Access to Secure Systems Online (PCASSO) project is designed to apply state-of-the-art-security to the communication of clinical information over the Internet. DESIGN The authors report the legal and regulatory issues associated with deploying the system, and results of its use by providers and patients. Human subject protection concerns raised by the Institutio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید