نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

2012
Nelly Fazio Irippuge Milinda Perera

Motivation & State-of-the-Art Cryptographic tools for securing multicast communications: Broadcast Encryption (BE): transmit data to a dynamically changing set of recipients o Info about receivers is broadcast in the clear Receivers’ identities often sensitive. Secure communication ought to protect more than just transmitted content! Anonymous BE (ABE) [BBW06]: also hides receiver set Current b...

2000

Dependable verification of individuals has transformed into a fundamentally valuable service in a scope of regions, in police or military settings as well as in non-military personnel (civilian) applications, for example, money related exchanges methodology or access control too. Traditional authentication systems rely on either knowledge, such as a password or a PIN number or possession such a...

2009
Emiliano De Cristofaro Stanislaw Jarecki Jihye Kim Gene Tsudik

As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants’ privacy. A common current scenario involves an authorized party (client) who needs to retrieve sensitive information held by another party (server) such that: (1) the former only gets the information for which it is duly authorized, (2) ...

Journal: :Journal of Computer Security 2000
Vijayalakshmi Atluri Wei-kuang Huang

Workflow Management Systems (WFMS) are being widely used today by organizations to coordinate the execution of various applications representing their day-to-day tasks. To ensure that these tasks are executed by authorized users or processes (subjects), and to make sure that authorized subjects gain access on the required objects only during the execution of the specific task, granting and revo...

2002
Zoltán Miklós

The publish/subscribe communication model is increasingly considered for implementing middleware infrastructures for widely distributed applications. Scalability issues and routing algorithms of such systems have recently been the focus of intensive research. So far little attention has been given to security and management issues. In current publish/subscribe systems, malicious publishers can ...

2011
M. Poulymenopoulou Flora Malamateniou George Vassilacopoulos

Mobile in conjunction with cloud computing can fulfil the vision of "Pervasive Healthcare" by enabling authorized healthcare participants to access services and required patient information without locational, time and other restraints. Of particular importance on such healthcare systems that incorporate mobile devices and cloud services is protecting the confidentiality of patient information....

Journal: :Healthcare policy = Politiques de sante 2006
Timothy K S Christie Marianne Harris Julio S G Montaner

This paper examines the ethical probity of Health Canada's Special Access Program (SAP). The SAP is designed for patients with life-threatening conditions who require "emergency" access to drugs that are not authorized for use in Canada when conventional therapies have failed. We argue that the SAP inappropriately uses the tenets of evidence-based decision-making in situations where evidence-ba...

2000

Dependable verification of individuals has transformed into a fundamentally valuable service in a scope of regions, in police or military settings as well as in non-military personnel (civilian) applications, for example, money related exchanges methodology or access control too. Traditional authentication systems rely on either knowledge, such as a password or a PIN number or possession such a...

2009
Li-zhong Geng

Rapid increase of information resources speeds the development of network storage. And security of network storage satisfies the demands of privacy and safety of the information. Data encryption and personal identity authentication which are based on cryptography can protect the storage against non-authorized access, while they are ineffective for malicious authorized users and inherent attacks...

2010
Alexander Klimm Benjamin Glas Matthias Wachs Jürgen Becker Klaus D. Müller-Glaser

Public Key Cryptography enables for entity authentication protocols based on a platform’s knowledge of other platforms’ public key. This is particularly advantageous for embedded systems, such as FPGA platforms with limited or none read-protected memory resources. For access control to mobile systems, the public key of authorized tokens need to be stored inside the mobile platform. At some poin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید