نتایج جستجو برای: users violations

تعداد نتایج: 222582  

Journal: :JDCTA 2010
Abdulghani Ali Aman Jantan Ghassan Ahmed Ali

Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, this threat is still lacking powerful remedy till day. This paper proposes a potent model for unwanted traffic detection in edge-to-edge QoS network domain. It is designed to detect service violations and bandwidth theft...

2011
Sangseo Park Anthonie B. Ruighaver Sean B. Maynard Atif Ahmad

The enforcement of information security policy is an important issue in organisations. Previous studies approach policy enforcement using deterrence theory to deal with information security violations and focus on end-users’ awareness. This study investigates deterrence strategy within organisations from the perspective of information security managers. The results primarily reveal that current...

Journal: :EAI Endorsed Trans. Context-aware Syst. & Appl. 2017
H. T. Nguyen Anh Van Thi Tran Tuyet Anh Thi Nguyen Luc Tan Vo Phuoc Vinh Tran

For visualization of multivariable data, multivariate cube meets with the limitation of screen and human vision. Retinal variables are integrated into multivariate cube to enhance its visual characteristics. The selective feature of variables and associative feature of the values of the same variable are improved with the integration of retinal variable into the set of visual variables. The sel...

Journal: :Future Generation Comp. Syst. 2012
Vincent C. Emeakaroha Marco Aurélio Stelmar Netto Rodrigo N. Calheiros Ivona Brandic Rajkumar Buyya César A. F. De Rose

Cloud computing has become a popular paradigm for implementing scalable computing infrastructures provided on-demand on a case-by-case basis. Selfmanageable Cloud infrastructures are required in order to comply with users’ requirements defined by Service Level Agreements (SLAs) and to minimize user interactions with the computing environment. Thus, adequate SLA monitoring strategies and timely ...

Journal: :جغرافیا و توسعه فضای شهری 0
محمد اجزاء شکوهی رضا صمدی نصرت اله گودرزی محمد قنبری

extended abstract 1. introduction from about the 1950s, extraordinary growth of cities and increase of urban population have led to excessive growth of settlements in cities (muhallab taha, 2001(. this growth caused an unprecedented rise in land prices (zaheri & pour- mohammadi, 2006). land is an essential element in urban expansion and development (vander molen, 2002). therefore, quality and q...

2017
Xiaoyin Wang Xue Qin Mitra Bokaei Hosseini Rocky Slavin Travis D. Breaux Jianwei Niu

As the most popular mobile platform, Android devices have millions of users around the world. As these devices are used everyday and collects various data from users, effective privacy protection has been a well known challenge in the Android world. Existing privacy-protection approaches focus on information accessed from Android API methods, such as location and device ID, while existing secur...

2011
Peter Gilbert Byung-Gon Chun Landon P. Cox Jaeyeon Jung

Smartphones have revolutionized mobile computing, but have created concerns that many third-party mobile applications do not properly handle users’ privacy-sensitive data. In this paper, we propose AppInspector, an automated privacy validation system that analyzes apps and generates reports of potential privacy risks. A key insight is that distinguishing acceptable disclosures from privacy viol...

2005
Stefan Böttcher Rita Hartel

Privacy violations and the exposition of sensitive data to a third party may seriously damage the business of a company. Therefore, it is crucial for the company to identify that set of users that may have exposed the sensitive data. To identify that set of users is a problem, when multiple users must have access rights that allow them to access the exposed sensitive data. Our solution to the p...

2009
Oshani Wasana Seneviratne

The World Wide Web (WWW) is a platform in which users can share their work very effectively. Due to the nature of the medium, content on the WWW including text, images, and videos can be reused and remixed rapidly. Scientific research data, social networks, blogs, photo sharing sites and other such applications known collectively as the social web, and even general purpose websites have lots of...

2010
Jocelyn Simmonds Shoham Ben-David Marsha Chechik

Web service applications are distributed processes that are composed of dynamically bounded services. Since the overall system may only be available at runtime, static analysis is difficult to perform in this setting. Instead, these systems are many times checked dynamically, by monitoring their behavior during runtime. Our tool performs monitoring of web service applications, and, when violati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید