نتایج جستجو برای: unauthorized access

تعداد نتایج: 329692  

2013
Anders Fongen Federico Mancini

The use of Identity Management (IdM) may leverage the trust in a distributed Publish-Subscribe (PubSub) system. An IdM provides mutual authentication between publishers, subscribers and message routers, enforces access control on message delivery and integrity control of message content. Access control is also a means to reduce traffic in a PubSub network since unauthorized message traffic will...

2011
A. O. Oke O. M. Olaniyi O. T. Arulogun O. M. Olaniyan

Over the years, several security measures have been employed to combat the menace of insecurity of lives and property. This is done by preventing unauthorized entrance into buildings through entrance doors using conventional and electronic locks, discrete access code, and biometric methods such as the finger prints, thumb prints, the iris and facial recognition. In this paper, a prototyped door...

2005
George Bakos Sergey Bratus

Rule-based access control mechanisms, network firewalls and application input validation all serve to enforce security policy. When violating the acceptable conditions these defenses mandate, an unauthorized requester is generally turned away. We make an argument for a modification to traditional access limitation through redirection and deceptive completion across many layers of data communica...

2014
Souptik Sinha Sneha Goswami Aruna Chakroborty

Rapid development in technology has facilitated easy access to data in various domains. Security has hence become a subject of major concern. The paper brings forth a novel approach to embed a robust visible and invisible watermark into video frames, such that the authenticity of the original signal is maintained. Through Digital watermarking scheme, additional information is embedded in the vi...

2001
Ahmet M. Eskicioglu

In today’s digital world, multimedia content is delivered to homes via the Internet, satellite, terrestrial and cable networks. Scrambling is a common approach used by conditional access systems to prevent unauthorized access to audio/visual data. The descrambling keys are securely distributed to the receivers in the same transmission channel. Their protection is an important part of the key ma...

2004
Anand Dersingh Ramiro Liscano Allan G. Jost Hao Hu

Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP provides a flexible and scalable service discovery framework over IP networks. This paper presents an approach for service discovery and access control under session-based peer-to-peer communications. In other words, it is an approach providing mechanisms for restricting unauthorized discovery or acce...

ژورنال: طلوع بهداشت یزد 2018
اسکندری, سهیل, حاجی محمدی, بهادر, غضنفری, معصومه, کریمیان, نادر,

Introduction: Nowadays, meat products that are easily prepared and cooked are of great concern to the people. Among them, hamburgers are one of the products of meat production, which is often produced in both industrial and handmade form, and the use of unauthorized meat such as the undesirable plant adjuvants of slaughter animals (lung, breast, spleen, abdominal cavity organs, gizzard, chicken...

Journal: :The Journal of Korean Institute of Communications and Information Sciences 2015

2016
Anil Kumar Bibhav Raj Partha Paul

Wireless technology has developed a significant part of communication and for the data transmission. Wireless LAN effectively fulfills the necessities within buildings and campus environments. Emerging security measures for the WLAN is a foremost issue when compared to the security features of LAN. Wireless access points mainly fall into three categories: minor business and home networks, enter...

2010
Xiuxia TIAN Zhongqin BI Jianping XU Daming LIU

Role-based access control is an important mechanism to prevent the unauthorized access in terms of roles. User hierarchy is an efficient structure to express the relations between different roles. The combination between role-based access control and the user hierarchy is required in different context, especially in open internet environment where the published or delegated data are encrypted f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید