نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

2016
Xingbing Fu Fagen Li Shengke Zeng

In this work, an oblivious transfer with complex access control scheme that is constructed based on ciphertext policy attribute based encryption (CP-ABE) scheme is proposed. In this scheme, the database server can enforce fine grained access control for each record where the authorized user is allowed to access, but the unauthorized user cannot, whereas it learns neither which record a user acc...

2012
Wensheng Zhang Chuang Wang

This paper presents a group signature scheme called AdHocSign for dynamically formed groups, to support accountable and anonymous access to outsourced data. Each user is assigned a certain set of attributes and the secrets associated with these attributes when joining the system; the access to outsourced data is regulated by a logical expression of attribute which defines an ad hoc group of aut...

Journal: :IJMCMC 2011
Yehia Elrakaiby Frédéric Cuppens Nora Cuppens-Boulahia

Pre-obligations denote actions that may be required before access is granted. The successful fulfillment of pre-obligations leads to the authorization of the requested access. Pre-obligations enable a more flexible enforcement of authorization policies. This paper formalizes interactions between the obligation and authorization policy states when pre-obligations are supported and investigates t...

2011
Seema Sarbjeet Singh Dolly Sharma

Grid infrastructures provide an environment for high performance computing by combining heterogeneous, widely distributed computational resources into a single cohesive computing infrastructure. One of the key goals of grid computing infrastructure is to provide an environment where users can share resources across heterogeneous domains. In such an infrastructure security is the major concern. ...

Journal: :Journal of Research and Practice in Information Technology 2014
Ki-Seok Bang Il-Gon Kim Ji-Yeon Lee Jin-Young Choi

Healthcare information and its secure management has become an active research topic along with an increase in the usage of XML documents and the importance of access control in maintaining patient records. In this paper, we present a methodology to describe a formal specification for an authorized view of an XMLbased healthcare system having a schema-level access control by assigning well-esta...

One of the most dangerous insider threats in a supervisory control and data acquisition (SCADA) system is the operational threat. An operational threat occurs when an authorized operator misuses the permissions, and brings catastrophic damages by sending legitimate control commands. Providing too many permissions may backfire, when an operator wrongly or deliberately abuses the privileges. Ther...

2017
Kay Delores Lillig Cotter James Paulson Robert Jones

This Thesis is brought to you for free and open access. It has been accepted for inclusion in Dissertations and Theses by an authorized administrator of PDXScholar. For more information, please contact [email protected]. Recommended Citation Lillig Cotter, Kay Delores, "A Functional Analysis of the Effects of a Token Economy Program on Attending Behavior in Children and Subsequent Test Perform...

2017
Mary M. Capraro Ali Bicer Melva R. Grant Yvonna S. Lincoln

This Article is brought to you for free and open access by the STEM Education & Professional Studies at ODU Digital Commons. It has been accepted for inclusion in STEMPS Faculty Publications by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. Repository Citation Capraro, Mary M.; Bicer, Ali; Grant, Melva R.; and Lincoln, Yvonna S.,...

2016
Michael L. Nelson Johan Bollen Giridhar Manepalli Rabia Haq

This Article is brought to you for free and open access by the Computer Science at ODU Digital Commons. It has been accepted for inclusion in Computer Science Faculty Publications by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. Repository Citation Nelson, Michael L.; Bollen, Johan; Manepalli, Giridhar; and Haq, Rabia, "Archive ...

2017
Fang Q. Hu

This Article is brought to you for free and open access by the Mathematics & Statistics at ODU Digital Commons. It has been accepted for inclusion in Mathematics & Statistics Faculty Publications by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. Repository Citation Hu, Fang Q., "A Fast Numerical Solution of Scattering by a Cylind...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید