نتایج جستجو برای: unauthorized access
تعداد نتایج: 329692 فیلتر نتایج به سال:
As the health care industry enters the era of knowledge management it must place security at the foundation of the transition. Risks are pervasive to every aspect of information and knowledge management. Without secure practices that seek to avoid or mitigate the effects of these risks, how can health care organisations ensure that knowledge is captured, stored, distributed, used, destroyed and...
Once electronic content—such as a password to access a website’s resources— has been released, it is very difficult to prevent it from being shared, which can cause economic harm to the content’s owner and others. Most attempts to prevent unauthorized sharing of digital content have been based on technology or legal punishments, but these approaches have not been completely effective. We propos...
Given the increase in global positioning system enabled devices and the ubiquitous ability to connect wirelessly to information through location-based services, organizations are challenged to offer privacy-by-design support systems. Given this, we offer a conceptual framework to capture the impact of the individual component weights of concern for information privacy on behavioral intent of di...
Cloud computing offers the on demand computational infrastructure to the users which has the potential to decrease the huge cost to build IT based services. It can provide ubiquitous, convenient data storage facility. It is a significant issue as the whole data stored to a set of interconnected resource pools which are situated over different location of the world. Stored data can be accessed t...
Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems....
Nowadays, the consumption of meat and meat products has been increased with modern manufacturing techniques. Due to the economic value, the likelihood of using unauthorized tissue is possible in meat products. The aim of this study was to apply morphological methods for detection of unauthorized tissues in meat sausage. In this study, a total number of 20 samples of different types of sausages ...
application of morphological method for detection of unauthorized tissues in processed meat products
background: nowadays, there is an increase of meat and animal carcass consumption worldwide. due to the economic value of meat, the likelihood of using unauthorized tissue is possible in meat products. based on these observations, the aim of the present study was to apply morphological method for detection of unauthorized tissues in processed meat products. methods: in this study, a total of 2...
Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user needs. On the other hand, standard access control trusts users once they have authenticated, despite the fact that they may reach unauthorized contexts. We analyse how taking into account dynamic information like context...
This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-Based Cryptography. Our solution has several advantages. First, it provides secrecy for encrypted data which are stored in public servers. Second, it of...
Implantable medical devices (IMDs) are man-made devices, which can be implanted in the human body to improve the functioning of various organs. The IMDs monitor and treat physiological condition of the human being (for example, monitoring of blood glucose level by insulin pump). The advancement of information and communication technology (ICT) enhances the communication capabilities of IMDs. In...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید