نتایج جستجو برای: implementation of access control

تعداد نتایج: 21307868  

2000
Damian G. Cholewka Reinhardt A. Botha Jan H. P. Eloff

Role-based access control associates roles with privileges and users with roles. Changes to these associations are infrequent and explicit. This may not reflect business requirements. Access to an object should not only be based on the identity of the object and the user, but also on the actual task that must be performed, i.e. the context of the work to be done. Context-sensitive access contro...

Journal: :Wireless Personal Communications 2010
Xin Li Hongke Zhang Jian-Ming Chang Jiann-Liang Chen Han-Chieh Chao

In this paper, we present an access control scheme for PIM-SM multicast domain. In order to avoid the overhead of digital signature algorithm, the proposed solution makes use of the Rendezvous Point to collect keys and implement a distributed shared-key based multicast access control system. As it supplies efficient host access control in PIM-SM domain, we name this scheme PIMac. Compared with ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه - دانشکده ادبیات و علوم انسانی 1392

language learning courseware has been receiving growing attention by english educators since its advent. a variety of softwares have been designed by software designers and resorted to by language educators to supplement language textbooks. this experimental study investigated how the application of computerized version of language textbooks and the reception of the entire course through comput...

Journal: :IEEE Trans. Computers 2015
Dianxiang Xu Michael Kent Lijo Thomas Tejeddine Mouelhi Yves Le Traon

Role-based access control is an important access control method for securing computer systems. A role-based access control policy can be implemented incorrectly due to various reasons, such as programming errors. Defects in the implementation may lead to unauthorized access and security breaches. To reveal access control defects, this paper presents a model-based approach to automated generatio...

Journal: : 2023

Family disarmament is a painful process for all members of the family, but especially young children. There an increasing trend in Latvia when divorced parents are unable to mutually agree on rights access common child. The aim research work was explore legal aspects implementation access. Seeking effective solution case parental divorce better protect child and ensure his or her interests. Exp...

Journal: :The Journal of the Korea institute of electronic communication sciences 2016

Journal: :journal of advances in computer research 2013
somayeh rahmani ahmad khademzadeh amir masoud eftekhari moghadam

in recent years, many researchers have been done in the area of wireless sensornetworks that has led to the variety of algorithms and methods for the collection andtransmission of environment information; but still many challenges faced bywireless sensor networks using methodologies are applied in various fields. such asmedia access control that due to the media being shared on these networks, ...

Journal: :international journal of health policy and management 2014
saurabh shrivastava prateek shrivastava jegadeesh ramasamy

global tuberculosis (tb) report (2013) has revealed that an estimated 8.6 million people developed tb of which, india accounts for almost 26% of the cases. these estimates clearly suggest that the country’s efforts to achieve millennium development goal 6 by 2015 have not delivered the desired output. in india, the tb prevention and control activities are supervised and implemented under the re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید