نتایج جستجو برای: secure access control

تعداد نتایج: 1651441  

Journal: :International Journal of Computer Applications 2016

Journal: :Wireless Communications and Mobile Computing 2022

According to OWASP-2021, more than 3,00,000 web applications have been detected for unauthenticated and unauthorised access leading a breach of security trust. Security patterns are commonly used in address the problem broken access. Web developers not experts implementing patterns. Therefore, it is necessary verify that pattern has applied, specifying original intent pattern. In this paper, an...

Journal: :International Journal for Information Security Research 2014

Journal: :Wireless Communications and Mobile Computing 2022

In recent years, the development of vehicular ad-hoc networks (VANETs) has received much attention in intelligent transportation systems (ITS). Unlike traditional networks, VANETs are emerging with unique characteristics that share similar technology autonomous vehicles (AVs) and automated driving (ASDs). Communication between surrounding infrastructure unit, such as a roadside unit (RSU), must...

1996
Zahir Tari George Fernandez

The Distributed Object Kernel (DOK) is a federated database system currently under development at the Royal Melbourne Institute of Technology. One of the issues currently under study is the development of a federated access control, as well a secure logical architecture allowing the DOK system to enforce federated security policies in the context of autonomous, distributed and heterogeneous dat...

Journal: :CoRR 2007
Satish Narayana Srirama Anton Naumenko

It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welcoming, the ability to provide secure and reliable communication in the vulnerable and volatile mobile ad-hoc topologies is vastly becoming necessary. The paper mainly addresses the details and issues in providing secur...

Journal: :Studies in health technology and informatics 2015
Jaime Delgado Silvia Llorente

Privacy provision is a key issue for successful secure access to patients' health information. Current approaches do not always provide patients with the ability to define suitable rules to access to their information in a secure way. This paper presents an approach to give patients control over their information by means of external services. In this way, health information management and acce...

2001
Virgil D. Gligor Himanshu Khurana Radostina K. Koleva Vijay G. Bharadwaj John S. Baras

Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only now emerging in the area of access control policies. In this paper, we review the motivation for access policy negotiation and we provide some examples of use in practice. In particular, we illustrate the meaning, the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید