نتایج جستجو برای: unauthorized access

تعداد نتایج: 329692  

2009
Duane Wilson Michael K. Lavine

One of the major challenges facing the security community today is how to prevent DE. DE is the unauthorized release of information from a computer system or network of systems. Current methods attempt to address this issue by controlling the information that is released over the Internet. In this paper, we present a host-level discretionary access control method that focuses on exfiltration vi...

2005
Wayne A. Jansen Serban I. Gavrila Clément Séveillac

While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two novel types of smart card with unconventional form factors, designed to take advantage of common interfaces built into many current handheld devices.

Journal: :IACR Cryptology ePrint Archive 2013
Appala Naidu Tentu Prabal Paul V. Ch. Venkaiah

Secret sharing is a cryptographic primitive, which is used to distribute a secret among participants in such a way that an authorized subset of participants can uniquely reconstruct the secret and an unauthorized subset can get no information about the secret. It is a fundamental method used in secure multiparty computations, where various distrusted participants cooperate and conduct computati...

2012
Mariana Raykova Hang Zhao Steven M. Bellovin

Traditional access control models often assume that the entity enforcing access control policies is also the owner of data and resources. This assumption no longer holds when data is outsourced to a third-party storage provider, such as the cloud. Existing access control solutions mainly focus on preserving confidentiality of stored data from unauthorized access and the storage provider. Howeve...

خسروی شادمانی, فاطمه, زایری, فرید, سوری, حمید, مهماندار, محمد رضا, کرمی, منوچهر,

Background & Objectives: In the chain of vehicles, human and environment, the human factors are the most complex element in the causes of road traffic injuries (RTIs). Unauthorized speeding and overtaking are considered as the main human factors resulting RTIs. This study estimated the population attributablefraction of two human factors, the most common risk factors of rural roads, of RTIs. Me...

2004
Paul Seligman Sean W. Smith

JSTOR is a not-for-profit online library containing a full back-run of digitized versions of a large number of academic journals. In order to help defray costs for maintaining the archive, subscribing institutions (such as libraries and universities) pay a fee to enable their users to access it. However, in order to make this access easy for authorized users—and to avoid requiring changes to th...

Journal: :Trans. Emerging Telecommunications Technologies 2013
Amer M. Magableh Redha M. Radaydeh Mohamed-Slim Alouini

Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to impr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید