نتایج جستجو برای: unauthorized access

تعداد نتایج: 329692  

2004
Darren Mundy David W. Chadwick

As the health care industry enters the era of knowledge management it must place security at the foundation of the transition. Risks are pervasive to every aspect of information and knowledge management. Without secure practices that seek to avoid or mitigate the effects of these risks, how can health care organisations ensure that knowledge is captured, stored, distributed, used, destroyed and...

Journal: :Electronic Commerce Research and Applications 2011
N. Boris Margolin Brian Neil Levine James D. Miller Matthew K. Wright

Once electronic content—such as a password to access a website’s resources— has been released, it is very difficult to prevent it from being shared, which can cause economic harm to the content’s owner and others. Most attempts to prevent unauthorized sharing of digital content have been based on technology or legal punishments, but these approaches have not been completely effective. We propos...

2014
Robyn L. Raschke Anjala S. Krishen Pushkin Kachroo

Given the increase in global positioning system enabled devices and the ubiquitous ability to connect wirelessly to information through location-based services, organizations are challenged to offer privacy-by-design support systems. Given this, we offer a conceptual framework to capture the impact of the individual component weights of concern for information privacy on behavioral intent of di...

2015
Mrinal Kanti Sarkar

Cloud computing offers the on demand computational infrastructure to the users which has the potential to decrease the huge cost to build IT based services. It can provide ubiquitous, convenient data storage facility. It is a significant issue as the whole data stored to a set of interconnected resource pools which are situated over different location of the world. Stored data can be accessed t...

2014
P. Ghann J. Shiguang C. Zhou

Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems....

Nowadays, the consumption of meat and meat products has been increased with modern manufacturing techniques. Due to the economic value, the likelihood of using unauthorized tissue is possible in meat products. The aim of this study was to apply morphological methods for detection of unauthorized tissues in meat sausage. In this study, a total number of 20 samples of different types of sausages ...

Journal: :journal of food quality and hazards control 0
r. latorre department of medical and surgical science, university of bologna, bologna, italy j. sadeghinezhad department of basic sciences, faculty of veterinary medicine, university of tehran, tehran, iran b. hajimohammadi research center for molecular identification of food hazards, shahid sadoughi university of medical sciences, yazd, iran f. izadi [email protected] m.t. sheibani department of basic sciences, faculty of veterinary medicine, university of tehran, tehran, iran

background: nowadays, there is an increase of meat and animal carcass consumption worldwide. due to the economic value of meat, the likelihood of using unauthorized tissue is possible in meat products. based on these observations, the aim of the present study was to apply morphological method for detection of unauthorized tissues in processed meat products.  methods: in this study, a total of 2...

Journal: :CoRR 2009
Jean-Yves Tigli Stephane Lavirotte Gaëtan Rey Vincent Hourdin Michel Riveill

Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user needs. On the other hand, standard access control trusts users once they have authenticated, despite the fact that they may reach unauthorized contexts. We analyse how taking into account dynamic information like context...

2013
Nesrine Kaaniche Aymen Boudguiga Maryline Laurent

This paper addresses the security issues of storing sensitive data in a cloud storage service and the need for users to trust the commercial cloud providers. It proposes a cryptographic scheme for cloud storage, based on an original usage of ID-Based Cryptography. Our solution has several advantages. First, it provides secrecy for encrypted data which are stored in public servers. Second, it of...

Journal: :IEEE journal of biomedical and health informatics 2017
Mohammad Wazid Ashok Kumar Das Neeraj Kumar Mauro Conti Athanasios V Vasilakos

Implantable medical devices (IMDs) are man-made devices, which can be implanted in the human body to improve the functioning of various organs. The IMDs monitor and treat physiological condition of the human being (for example, monitoring of blood glucose level by insulin pump). The advancement of information and communication technology (ICT) enhances the communication capabilities of IMDs. In...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید