نتایج جستجو برای: authorized access
تعداد نتایج: 331905 فیلتر نتایج به سال:
In this work, an oblivious transfer with complex access control scheme that is constructed based on ciphertext policy attribute based encryption (CP-ABE) scheme is proposed. In this scheme, the database server can enforce fine grained access control for each record where the authorized user is allowed to access, but the unauthorized user cannot, whereas it learns neither which record a user acc...
This paper presents a group signature scheme called AdHocSign for dynamically formed groups, to support accountable and anonymous access to outsourced data. Each user is assigned a certain set of attributes and the secrets associated with these attributes when joining the system; the access to outsourced data is regulated by a logical expression of attribute which defines an ad hoc group of aut...
Pre-obligations denote actions that may be required before access is granted. The successful fulfillment of pre-obligations leads to the authorization of the requested access. Pre-obligations enable a more flexible enforcement of authorization policies. This paper formalizes interactions between the obligation and authorization policy states when pre-obligations are supported and investigates t...
Grid infrastructures provide an environment for high performance computing by combining heterogeneous, widely distributed computational resources into a single cohesive computing infrastructure. One of the key goals of grid computing infrastructure is to provide an environment where users can share resources across heterogeneous domains. In such an infrastructure security is the major concern. ...
Healthcare information and its secure management has become an active research topic along with an increase in the usage of XML documents and the importance of access control in maintaining patient records. In this paper, we present a methodology to describe a formal specification for an authorized view of an XMLbased healthcare system having a schema-level access control by assigning well-esta...
One of the most dangerous insider threats in a supervisory control and data acquisition (SCADA) system is the operational threat. An operational threat occurs when an authorized operator misuses the permissions, and brings catastrophic damages by sending legitimate control commands. Providing too many permissions may backfire, when an operator wrongly or deliberately abuses the privileges. Ther...
This Thesis is brought to you for free and open access. It has been accepted for inclusion in Dissertations and Theses by an authorized administrator of PDXScholar. For more information, please contact [email protected]. Recommended Citation Lillig Cotter, Kay Delores, "A Functional Analysis of the Effects of a Token Economy Program on Attending Behavior in Children and Subsequent Test Perform...
This Article is brought to you for free and open access by the STEM Education & Professional Studies at ODU Digital Commons. It has been accepted for inclusion in STEMPS Faculty Publications by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. Repository Citation Capraro, Mary M.; Bicer, Ali; Grant, Melva R.; and Lincoln, Yvonna S.,...
This Article is brought to you for free and open access by the Computer Science at ODU Digital Commons. It has been accepted for inclusion in Computer Science Faculty Publications by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. Repository Citation Nelson, Michael L.; Bollen, Johan; Manepalli, Giridhar; and Haq, Rabia, "Archive ...
This Article is brought to you for free and open access by the Mathematics & Statistics at ODU Digital Commons. It has been accepted for inclusion in Mathematics & Statistics Faculty Publications by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. Repository Citation Hu, Fang Q., "A Fast Numerical Solution of Scattering by a Cylind...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید