نتایج جستجو برای: secure access control

تعداد نتایج: 1651441  

2007
M. Bernard G. Siva

Collaborative applications like video/audio conferencing, IP telephony, file sharing, collaborative work spaces, and multi-user games, having varied security requirements, require a secure and reliable group communication system to provide co-ordination among the processes. Peer to peer computing allows users to interact with each other and find and share resources without requiring a centraliz...

Journal: :Journal of King Saud University - Computer and Information Sciences 2020

Journal: :International Journal of Advanced Trends in Computer Science and Engineering 2020

1994
Sang H. Son Rasikan David

In addition to maintaining consistency of the database, secure concurrency control algorithms must be free from covert channels arising due to data conflicts between transactions. The existing secure concurrency control approaches are unfair to transactions at higher access classes. In this paper, a secure two-phase locking protocol is presented, which is correct and free from covert channels. ...

2011
Al F. Salam Singh

Secure knowledge management for eBusiness processes that span multiple organizations requires intraorganizational and interorganizational perspectives on security and access control issues. There is paucity in research on information assurance of distributed interorganizational eBusiness processes from a business process perspective. This paper presents a framework for secure semantic eBusiness...

2005
Stefan Böttcher Rita Hartel

Access control is an important aspect in guaranteeing data privacy within XML data sources which are accessed by users with different access rights. The goal of predicative access control for XML data sources is to use XPath expressions to describe that fragment of a given document or database that can be accessed by queries of a certain user. Our approach to access control hides the XML data s...

2005
Guang-Lei Song Kang Zhang Bhavani M. Thuraisingham Jun Kong

The interoperability among different data formats over the Internet has drawn increasing interest recently due to more and more heterogeneous data models are used in different Web services. In order to ease the manipulation of data models for heterogeneous data, generic model management has been intensively researched and also implemented in a prototype since its first introduction. Access cont...

2005
Guillermo Navarro-Arribas Jose A. Ortega-Ruiz Joan Ametller Sergi Robles

Mobile agent systems provide new perspectives for distributed e-commerce applications. These applications may present specific restrictions, making mobile agent systems a feasible solution. Even so, mobile agents present some security related problems. An important one is resource access control. The ability for mobile agents to provide a simple, scalable, flexible, and secure access control sy...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

2006
Bin Zhao Yingbo Hua

For army, the mobility of an entire communication network is desirable. A large mobile communication network inevitably involves a large network of wireless routers. The throughput of a large network of wireless routers critically depends on distributed medium access control (MAC). In this paper, we present a MAC scheme to be called opportunistic synchronous array method (OSAM). The O-SAM is di...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید