نتایج جستجو برای: unauthorized access
تعداد نتایج: 329692 فیلتر نتایج به سال:
The most common devices used to control access to private areas where sensitive work is being carried out or where data is held, are keys, badges and magnetic cards. These all have the same basic disadvantages: they can easily be duplicated and when stolen or passed on, they can allow entry by an unauthorized person. This paper proposed a low cost embedded controller based smart card which cons...
In this paper we present JDOSecure1, a novel security approach for the Java Data Objects specification. The objective of JDOSecure is to prevent unauthorized access to the data store while using the JDO API. Based on the dynamic proxy approach, JDOSecure is able to collaborate with any JDO implementation without source code modification or recompilation. It introduces a fine grained access cont...
Due to rapid growth of distributed network and Internet, it becomes easy for data providers and users to access, manage, and share voluminous geospatial data in digital form. With Internet, it becomes very easy to distribute and copy geospatial data. Therefore, it becomes necessary to protect geospatial data from illegal and unauthorized usage. The increase availability of tools and techniques ...
The application of agent methodologies in process monitoring and control is a relatively novel approach, particularly suitable for distributed and dislocated systems. As for marine reservers, access monitoring is aimed at avoiding intrusions of unauthorized boats – also considering that, typically, marine reserves are located in areas not easily accessible. Typical solutions consist of using ra...
1. Sontag D. Deported in a coma, saved back in U.S. New York Times. November 8, 2008:A1. 2. Passel JS, Cohn D. A portrait of unauthorized immigrants in the United States. Washington, DC: Pew Hispanic Center, April 14, 2009 (http://pewhispanic.org/files/reports/ 107.pdf). 3. Goldman DP, Smith JP, Sood N. Legal status and health insurance among immigrants. Health Aff (Millwood) 2005;24:1640-53. 4...
In this paper we examine how a network intrusion detection system can be used as a trigger for service checking and reporting. This approach reduces the amount of false alerts (false positives) and raises the quality of the alert report. A sample data over the Christmas period of year 2002 is analyzed as an example and detection of unauthorized SSH servers used as the main application. Unauthor...
Cryptography is the science of keeping secrets. It is mainly related to data security when transmitting data over networks. During data transmission intruders may possible to acquire information without the knowledge of sender and receiver. So it needs some mechanism to prevent unauthorized access. The security system deals with Multi-Modal biometric features namely Finger-Knuckle-Print and Fin...
Jongwon Seok et al. 181 Digital watermark technology is now drawing attention as a new method of protecting digital content from unauthorized copying. This paper presents a novel audio watermarking algorithm to protect against unauthorized copying of digital audio. The proposed watermarking scheme includes a psychoacoustic model of MPEG audio coding to ensure that the watermarking does not affe...
Database and database technologies form a core component of many computing systems and applications which allow data to be stored, retained and shared electronically. As the use of database systems and the amount of data contained in these systems grows continuously and exponentially, database security has become an issue of utmost importance due to an increase in the number of incidents report...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید