نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

2012
P Devaki

If a secret key or a password is to be used in an application, where multi users are involved, then it is better to share the key or the password to all the authorized users in such a way that a minimum or all the shares of the users put together must result in the key or the password. This method avoids the unauthorized access to the information by a single user with out the knowledge of the o...

2009

WARNING: FLUDARA FOR INJECTION should be administered under the supervision of a 6 qualified physician experienced in the use of antineoplastic therapy. FLUDARA FOR 7 INJECTION can severely suppress bone marrow function. When used at high doses in dose8 ranging studies in patients with acute leukemia, FLUDARA FOR INJECTION was associated 9 with severe neurologic effects, including blindness, co...

2010
Hung-Yu Chien Ying-Lun Chen Chien-Feng Lo Yuh-Ming Huang

A time-bound hierarchical key assignment scheme is a cryptographic key assignment scheme that organizes and encrypts the resources, according to the hierarchical tree relations and the time constraint, such that only authorized users can efficiently access the resources. This paper proposes a practical time-bound key assignment scheme, which is efficient and is proved secure. We, based on the t...

2017
Patricia L. Bellia

Thirty years ago, Congress passed the Computer Fraud and Abuse Act ("CFAA ") to combat the emerging problem of computer crime. The statute's core prohibitions targeted one who "accesses" a computer "without authorization" or who "exceeds authorized access." Over time, the incremental statutory changes and large-scale technological changes have dramatically expanded the potential scope of the CF...

Journal: :IACR Cryptology ePrint Archive 2001
Amos Beimel Yuval Ishai

A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some predefined authorized sets of parties will be able to reconstruct the secret from their shares. The (monotone) collection of authorized sets is called an access structure, and is freely identified with its characteristic monotone function f : f0; 1gn ! f0; 1g. A family of secret-sharing schemes i...

2001
Amos Beimel Yuval Ishai

A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some predefined authorized sets of parties will be able to reconstruct the secret from their shares. The (monotone) collection of authorized sets is called an access structure, and is freely identified with its characteristic monotone function f : f0; 1gn ! f0; 1g. A family of secret-sharing schemes i...

2001
Amos Beimel Yuval Ishai

A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some predefined authorized sets of parties will be able to reconstruct the secret from their shares. The (monotone) collection of authorized sets is called an access structure, and is freely identified with its characteristic monotone function f : {0, 1}n → {0, 1}. A family of secret-sharing schemes i...

Journal: :J. Internet Serv. Inf. Secur. 2015
Parisa Kaghazgaran Hassan Takabi

The insider threat remains one of the most serious challenges to computer security. An insider attack occurs when an authorized user misuses his privileges and causes damages to the organization. Deception techniques have served as a common solution to insider threat detection, and several techniques, such as approaches based on honey entities, have been proposed. On the other hand, access cont...

Journal: :Physical review letters 2001
V K Vanag I R Epstein

Turing structures, standing waves, oscillatory clusters, and accelerating waves have been found in the spatially extended Belousov-Zhabotinsky system dispersed in water droplets of a reverse AOT microemulsion. The variety of patterns is determined by the tunable microstructure of the medium, i.e., by the concentration and size of water droplets. We propose a simple model to describe this system.

Journal: :IACR Cryptology ePrint Archive 2008
Vanesa Daza Javier Herranz Paz Morillo Carla Ràfols

In secret sharing schemes a secret is distributed among a set of users P in such a way that only some sets, the authorized sets, can recover it. The family Γ of authorized sets is called access structure. Given such a monotone family Γ ⊂ 2P , we introduce the concept of extended access structures, defined over a larger set P ′ = P ∪ P̃, satisfying these two properties: • the set P is a minimal s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید