نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

2006
Mudhakar Srivatsa

Advances in networking technologies have triggered the “storage as a service” (SAS) model. The SAS model allows content providers to leverage hardware and software solutions provided by the storage service providers (SSPs), without having to develop them on their own, thereby freeing them to concentrate on their core business. The SAS model is faced with at least two important security issues: ...

2009
Ninghui Li

Database access control plays a central role in ensuring authorized access to sensitive information. As cross-organization information sharing becomes a must for the collaboration among corporations and governmental agencies, table-level or column-level database access control is no longer adequate. View-based approaches, on the other hand, require separate views for potentially large number of...

Journal: :Electr. Notes Theor. Comput. Sci. 2009
Horatiu Cirstea Pierre-Etienne Moreau Anderson Santana de Oliveira

Data protection within information systems is one of the main concerns in computer systems security and different access control policies can be used to specify the access requests that should be granted or denied. These access control mechanisms should guarantee that information can be accessed only by authorized users and thus prevent all information leakage. We propose a methodology for spec...

2014
Eric Scott Elliott

This Open Access Master's Thesis is brought to you for free and open access by the CGU Student Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in CGU Theses & Dissertations by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. Recommended Citation Elliott, Eric Scott, "Historical Accuracy and the...

2014
Tara Chaffee Robinson

This Open Access Master's Thesis is brought to you for free and open access by the CGU Student Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in CGU Theses & Dissertations by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. Recommended Citation Robinson, Tara Chaffee, "Teaching Activist Intell...

1999
Christian Gilmore David P. Kormann Aviel D. Rubin

We address the problem of secure remote access to a site's internal web server from outside the rewall. The goal is to give authorized users access to sensitive information, while protecting the information from others. We implemented our solution using a one-time password scheme for client authentication and SSL for con dentiality. Our main design considerations were security, performance, eas...

1999
Christian Gilmore David Kormann Aviel D. Rubin

We address the problem of secure remote access to a site's internal web server from outside the rewall. The idea is to give authorized users access to sensitive information, while protecting the information from others. We implemented our solution using a one-time password scheme for client authentication and SSL for conndentiality. Our main design considerations were security, performance, eas...

2005
Robby Fussell

The issue in today’s society is access, whether entering into a restricted building like an office or home, or attempting to access a bank account or credit card. An individual must prove their identity before authorized for utilization. Bruce Schneier, a well-known security expert and CEO of Counterpane Internet Security, states the need to be able to identify, authenticate, and authorize indi...

2012
Hadiseh Seyyed Alipour Mehdi Sabbari

Access control has been found to be one of the effective ways of insuring that only authorized users have access to the information resources to perform their job function. The overall objective of any access control policy rule is to define, sensitive information may be disclosed when, why, how and to whom. In one hand resources should be protected against unauthorized access and in the other ...

2003
Roger Crandell James Clifford Alexander Kent

The LANL transparent web proxy lets authorized external users originating from the Internet to securely access internal intranet web content and applications normally blocked by a firewall. Unauthenticated access is still, of course, denied. The proxy is transparent in that no changes to browsers, user interaction, or intranet web servers are necessary. The proxy, a few thousand lines of C runn...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید