نتایج جستجو برای: unauthorized access

تعداد نتایج: 329692  

2008
Durg Singh Chauhan

The most common devices used to control access to private areas where sensitive work is being carried out or where data is held, are keys, badges and magnetic cards. These all have the same basic disadvantages: they can easily be duplicated and when stolen or passed on, they can allow entry by an unauthorized person. This paper proposed a low cost embedded controller based smart card which cons...

2006
Matthias Merz

In this paper we present JDOSecure1, a novel security approach for the Java Data Objects specification. The objective of JDOSecure is to prevent unauthorized access to the data store while using the JDO API. Based on the dynamic proxy approach, JDOSecure is able to collaborate with any JDO implementation without source code modification or recompilation. It introduces a fine grained access cont...

2013
Sangita Zope- Chaudhari P. Venkatachalam

Due to rapid growth of distributed network and Internet, it becomes easy for data providers and users to access, manage, and share voluminous geospatial data in digital form. With Internet, it becomes very easy to distribute and copy geospatial data. Therefore, it becomes necessary to protect geospatial data from illegal and unauthorized usage. The increase availability of tools and techniques ...

2009
Andrea Addis Giuliano Armano Eloisa Vargiu

The application of agent methodologies in process monitoring and control is a relatively novel approach, particularly suitable for distributed and dislocated systems. As for marine reservers, access monitoring is aimed at avoiding intrusions of unauthorized boats – also considering that, typically, marine reserves are located in areas not easily accessible. Typical solutions consist of using ra...

Journal: :The New England journal of medicine 2013
Hugo Scornik

1. Sontag D. Deported in a coma, saved back in U.S. New York Times. November 8, 2008:A1. 2. Passel JS, Cohn D. A portrait of unauthorized immigrants in the United States. Washington, DC: Pew Hispanic Center, April 14, 2009 (http://pewhispanic.org/files/reports/ 107.pdf). 3. Goldman DP, Smith JP, Sood N. Legal status and health insurance among immigrants. Health Aff (Millwood) 2005;24:1640-53. 4...

Journal: :University of Pennsylvania Law Review and American Law Register 1935

2003
Jukka Juslin Teemupekka Virtanen

In this paper we examine how a network intrusion detection system can be used as a trigger for service checking and reporting. This approach reduces the amount of false alerts (false positives) and raises the quality of the alert report. A sample data over the Christmas period of year 2002 is analyzed as an example and detection of unauthorized SSH servers used as the main application. Unauthor...

2015
M. Natarajan T. Mekala R. Vikram

Cryptography is the science of keeping secrets. It is mainly related to data security when transmitting data over networks. During data transmission intruders may possible to acquire information without the knowledge of sender and receiver. So it needs some mechanism to prevent unauthorized access. The security system deals with Multi-Modal biometric features namely Finger-Knuckle-Print and Fin...

2002
Jongwon Seok Jinwoo Hong Jinwoong Kim

Jongwon Seok et al. 181 Digital watermark technology is now drawing attention as a new method of protecting digital content from unauthorized copying. This paper presents a novel audio watermarking algorithm to protect against unauthorized copying of digital audio. The proposed watermarking scheme includes a psychoacoustic model of MPEG audio coding to ensure that the watermarking does not affe...

2013
S. M. Mundada

Database and database technologies form a core component of many computing systems and applications which allow data to be stored, retained and shared electronically. As the use of database systems and the amount of data contained in these systems grows continuously and exponentially, database security has become an issue of utmost importance due to an increase in the number of incidents report...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید