نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

Journal: :J. Inf. Sci. Eng. 2001
Gwoboa Horng

A secret sharing scheme is a way of protecting a secret by distributing partial information to a set of participants P in such a way that only authorized subsets of P can recover the secret. The family of authorized subsets is called the access structure of the scheme. In 1979, threshold schemes were proposed to realize threshold access structures, and in 1987, multiple assignment schemes were ...

2004
Ryoh Fuji-Hara Ying Miao

An ideal secret sharing scheme is a method of sharing a secret key in some key space among a finite set of participants in such a way that only the authorized subsets of participants can reconstruct the secret key from their shares which are of the same length as that of the secret key. The set of all authorized subsets of participants is the access structure of the secret sharing scheme. In th...

Journal: :JoWUA 2015
Lewis Nkenyereye Bayu Adhi Tama Youngho Park Kyung Hyune Rhee

Vehicle safety related applications which are drawing increasing attention in public have attracted extensive research both in academic and industry areas. However, it is assumed that one service is offered by one provider, thus forcing vehicle drivers to subscribe to several service providers within limited computation capabilities. In this paper, we present a fine-grained privacy preserving p...

2001
Yuhui Zhong Bharat Bhargava

Unlike in traditional computing environments such as operating systems or databases, the authorized user set, the mode of access, users’ access rights, etc., are not predefined in WWW. In order to assign privileges to authorized but not predefined users in dynamic access environments, we propose an approach called authentication-driven authorization. In this approach, authentication is integrat...

Journal: :IACR Cryptology ePrint Archive 2013
Appala Naidu Tentu Prabal Paul V. Ch. Venkaiah

Secret sharing is a cryptographic primitive, which is used to distribute a secret among participants in such a way that an authorized subset of participants can uniquely reconstruct the secret and an unauthorized subset can get no information about the secret. It is a fundamental method used in secure multiparty computations, where various distrusted participants cooperate and conduct computati...

Journal: :International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2019

Journal: :Studies in health technology and informatics 2021

Access to hospitals has been dramatically restricted during the COVID 19 pandemic. Indeed, due high risk of contamination by patients and visitors, only essential visits medical appointments have authorized. Restricting hospital access authorized visitors was an important logistic challenge. To deal with this challenge, our institution developed ExpectingU app facilitate patient authorization f...

2007
Wahyudi Winda Astuti

Secure buildings are currently protected from unauthorized access by a variety of devices. Even though there are many kinds of devices to guarantee the system safety such as PIN pads, keys both conventional and electronic, identity cards, cryptographic and dual control procedures, the people voice can also be used. The ability to verify the identity of a speaker by analyzing speech, or speaker ...

Journal: :IACR Cryptology ePrint Archive 2012
Jun Zhou Zhenfu Cao

Distributed m-healthcare systems significantly facilitate efficient patient treatment of high quality, while bringing about the challenge of keeping both the confidentiality of the personal health information and the patients’ identity privacy simultaneously. It makes many existing data access control and anonymous authentication schemes inefficient in distributed mhealthcare systems. To solve ...

2009
Dongwon Lee Ting Yu

Definition XML access control refers to the practice of limiting access to (parts of) XML data to only authorized users. Similar to access control over other types of data and resources, XML access control is centered around two key problems: (i) the development of formal models for the specification of access control policies over XML data; and (ii) techniques for efficient enforcement of acce...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید