نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

2007
Eunjee Song Indrakshi Ray Hanil Kim

From a software design perspective, access control policies are requirements that must be addressed in a design. For example, access control policies are constraints that determine the type of access authorized users have on information resources. In this paper, we show how one can formulate access control policies as a policy model, formulate an access control aspect model that enforces polici...

2015
Swati Jagtap

Vehicle identification plays important role in Intelligent Transportation System. Vehicle is identified uniquely by its number plate. It is used for applications like identification of authorized vehicles, providing controlled access to restricted areas, and law enforcement. In the proposed system the license number of the car is checked against the database of authorized users and only authori...

2009
Giuliano Armano Eloisa Vargiu

Setting up a marine reserve involves access monitoring, with the goal of avoiding intrusions of not authorized boats – also considering that, typically, marine reserves are located in areas not easily accessible. Nowadays, intrusion detection in marine reserves is carried out by using radar systems or suitable cameras activated by movement sensors. In this paper, we present a multiagent system ...

2013
Neha Dubey Ravi Mohan Sumit Sharma

At present methods for providing conditional access to restricted resources and applications for permitting personnel, such as military members, government agencies, or first-responders are not available. The conditional access is provided if the user is an authentic user in one of the authorized geographic location and is connected to specific base transceiver stations or base station controll...

2007
Kaushik Veeraraghavan Andrew Myrick Jason Flinn

How should a distributed file system manage access to protected content? On one hand, distributed storage should make data access pervasive: authorized users should be able to access their data from any location. On the other hand, content protection is designed to restrict access— this is often accomplished by limiting the set of computers from which content can be accessed. In this paper, we ...

Journal: :J. UCS 2010
Lidia Rovan Tomislav Jagust Mirta Baranovic

Currently, the World Wide Web is mostly composed of isolated and loosely connected "data islands". Connecting them together and retrieving only the information that is of interest to the user is the common Web usage process. Creating infrastructure that would support automation of that process by aggregating and integrating Web data in accordance to user’s personal preferences would greatly imp...

2008
Jing Jin Gail-Joon Ahn Michael J. Covington Xinwen Zhang Robert Dolin Henry Levin

Abstract. The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanis...

2013
Santanu Chatterjee Ashok Kumar Das Jamuna Kanta Sing

as: Chatt sity – Co Abstract Wireless body area networks (WBANs) can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes ...

2003
Tuva Stang Fahimeh Pourbayat Mark Burgess Geoffrey Canright Kenth Engø-Monsen Åsmund Weltzien

Archipelago is system analysis and visualization tool which implements several methods of automated resource and security analysis for humancomputer networks; this includes physical networks, social networks, knowledge networks and networks of clues in a forensic analysis. Access control, intrusions and social engineering can be discussed in the framework of graphical and information theoretica...

2008
Jing Jin Gail-Joon Ahn Michael J. Covington Xinwen Zhang

The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are req...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید