نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

2016
Ch V Raju

Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized user can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization of relational data to anonymize and satisfy privacy requirements, e.g.,...

Journal: :European Journal of Life Writing 2014

Journal: :Canadian Journal of Communication 2002

2011
ANDREAS MATTAS IOANNIS MAVRIDIS CHRISTOS ILIOUDIS IOANNIS PAGKALOS

Access control administration regulates and enforces the definition of the components of an access control system by authorized administrative users. In this paper, the limitations on administrative aspects of well-known security models are addressed and the requirements for efficient management of authorizations are investigated in order to provide fine-grained and just-in-time access control ...

Journal: :IJCNIS 2016
Afshin Rezakhani Hossein Shirazi Naser Modiri

Nowadays, access control has an important role in the management of access to resources in the networks and applications. The establishment of access control in applications is important particularly. Traditional methods of access control, manage the users’ access only at data-centric level. In this paper a new model is presented in which the access control in applications is performed not only...

Journal: :PORTO ARTE: Revista de Artes Visuais 2013

2015
Mahsa Shabani Stephanie O. M. Dyke Yann Joly Pascal Borry

In parallel with massive genomic data production, data sharing practices have rapidly expanded over the last decade. To ensure authorized access to data, access review by data access committees (DACs) has been utilized as one potential solution. Here we discuss core elements to be integrated into the fabric of access review by both established and emerging DACs in order to foster fair, efficien...

2013
M. Ramalingam R. M. S. Parvathi

A semantic access control mechanism is used to provide access permission to the authorized users. Some access control models think about the rich semantic relations between the requested and the availing services. They will not filter out the services that do not met both the service providers’ policies as well as the users’ policies, because they offer only coarse-grained access. To solve this...

1997
Todd Parnell

Computational Power. We have been assuming in our previous discussions that people can do complicated calculations. Encryption, hashing, ZK proofs, etc. all require a user to perform di cult computations. But people don't do computations, machines do. How do we, as people, identify ourselves to a machine? Access control. The process of of enforcing access rights for network resources. Access co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید