نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

2013
Yi-Ruei Chen Cheng-Kang Chu Wen-Guey Tzeng Jianying Zhou

Cloud services are blooming recently. They provide a convenient way for data accessing, sharing, and processing. A key ingredient for successful cloud services is to control data access while considering the specific features of cloud services. The specific features include great quantity of outsourced data, large number of users, honest-but-curious cloud servers, frequently changed user set, d...

2001
Arthur Fisher

Current authentication protocols (i.e. user login and password) successfully restrict access to properly configured workstations and servers. Traditionally, a user’s privileges will allow (or deny) access to files or applications on the local machine or on other machines within its domain. Yet, authorized access to a particular machine (or domain) does not necessarily correlate with access to p...

2011
ROUMEN KOUNTCHEV ROUMIANA KOUNTCHEVA

In the paper is presented one new approach for management of medical databases with multi-layer access, based on the Inverse Pyramid Decomposition. This decomposition offers the ability for the development of interactive tools for multi-layer transfer of the processed visual information with consecutively quality improvement, selection of regions of interest, which to be directly accessed and r...

1990
Morrie Gasser E. McDermott

Delegation is the process whereby a user in a distributed environment authorizes a system to access remote resources on his behalf. In today’s distributed systems where all the resources required to carry out an operation are rarely local to the system to which the user is logged in, delegation is more often the rule than the exception. Yet, even with the use of state-of-the-art authentication ...

2017
Ousmane Amadou Dia

The authors propose a business-oriented approach to support accurate and dynamic user-role assignments for the Role Based Access Control (RBAC) model. Their model, called Business-Driven Role Based Access Control (BD-RBAC), is composed of three layers. The first layer extends the RBAC model with the concepts of business roles, system roles, credentials, and users’ capabilities. The second layer...

Journal: :فقه و مبانی حقوق اسلامی 0
اکبر احمدی دانشجوی دکتری فقه و مبانی حقوق اسلامی دانشکده الهیات سیدمحمدرضا امام دانشیار دانشکده الهیات عابدین مومنی استادیار دانشکده الهیات علی مظهر قراملکی دانشیار دانشکده الهیات

study of validity of implications of proofs is among fundamental discussions in both usul al-fiqh and fiqh. authorized conjectural proofs (amarat) and practical principles can have indirect juristic implications as they have direct ones. investigation of validity of such indirect implications and effects is entitled investigation of validity of implications of proofs. some usulis hold that impl...

1997
Matti A. Hiltunen Richard D. Schlichting

Access control involves maintaining information about which users can access system resources and ensuring that access is restricted to authorized users. In wide-area networks such as the Internet, implementing access control is difficult, since resources may be replicated, the task of managing access rights may be distributed among multiple sites, and events such as host failures, host recover...

2005
Barbara Weber Manfred Reichert Werner Wild Stefanie Rinderle-Ma

Process–aware information systems (PAIS) must provide sufficient flexibility to their users to support a broad spectrum of application scenarios. As a response to this need adaptive process management systems (PMS) have emerged, supporting both ad-hoc deviations from the predefined process schema and the quick adaptation of the PAIS to business process changes. This newly gained runtime flexibi...

Journal: :IJISP 2013
Ousmane Amadou Dia Csilla Farkas

The authors propose a business-oriented approach to support accurate and dynamic user-role assignments for the Role Based Access Control (RBAC) model. Their model, called Business-Driven Role Based Access Control (BD-RBAC), is composed of three layers. The first layer extends the RBAC model with the concepts of business roles, system roles, credentials, and users’ capabilities. The second layer...

Journal: :Optical and Quantum Electronics 2023

Abstract We numerically study a new hardware method for network authentication, using pair of chaotic lasers subject to the same optical injection from third laser, in close-loop configuration. One laser is secure environment, other unsecure and if their parameters are matched (i.e., they ‘twins’), suitable operating conditions synchronize generate pseudo-random amplitude modulation. Access env...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید