نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

2014
Sammuel Jalali

This Open Access Dissertation is brought to you for free and open access by the CGU Student Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in CGU Theses & Dissertations by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. Recommended Citation Jalali, Sammuel, "Wireless Channel Equalization in D...

2017
I Askoxylakis S Ioannidis S Katsikas Aggelos Kiayias Ozgur Oksuz Alexander Russell Qiang Tang Bing Wang

In this paper, we provide a secure and e cient encrypted keyword search scheme for multi-user data sharing. Specifically, a data owner outsources a set of encrypted files to an untrusted server, shares it with a set of users, and a user is allowed to search keywords in a subset of files that he is authorized to access. In the proposed scheme, (a) each user has a constant size secret key, (b) ea...

2014
Davy Preuveneers Wouter Joosen

As next generation health monitoring and Ambient Assisted Living applications are opening up towards a variety of stakeholders and platforms, enforcing secure and reliable access to patient data by authorized users − anytime and anywhere − is paramount. However, static access control policies do not offer the flexibility to deal with unanticipated emergency situations where access to patient in...

1999
Christian Gilmore David Kormann Aviel D. Rubin

We address the problem of secure remote access to a site's internal web server from outside the re-wall. The idea is to give authorized users access to sensitive information, while protecting the information from others. We implemented our solution using a one-time password scheme for client authentication and SSL for conndentiality. Our main design considerations were security, performance, ea...

Journal: :JSW 2007
Linh Ngo Amy W. Apon

Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is maintained at their home institution. With Shibboleth, a federation of institutions can share resources among users and yet allow the administration of both the user access control to resources and the user identity and a...

2016
Aggelos Kiayias Ozgur Oksuz Alexander Russell Qiang Tang Bing Wang

In this paper, we provide a secure and e cient encrypted keyword search scheme for multi-user data sharing. Specifically, a data owner outsources a set of encrypted files to an untrusted server, shares it with a set of users, and a user is allowed to search keywords in a subset of files that he is authorized to access. In the proposed scheme, (a) each user has a constant size secret key, (b) ea...

2012
Dirk Thorleuchter Dirk Van den Poel

Multilevel security (MLS) is specifically created to protect information from unauthorized access. In MLS, documents are assigned to a security label by a trusted subject e.g. an authorized user and based on this assignment; the access to documents is allowed or denied. Using a large number of security labels lead to a complex administration in MLS based operating systems. This is because the m...

Journal: :RFC 2000
Ellen Stokes Debbie Byrne Bob Blakley Prasanta Behera

Access Control Requirements for LDAP Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document describes the fundamental requirements of an access control list (ACL) model for the Lightweight Directory Application Protocol (LDAP) directory service. It is inte...

Journal: :Journal of Applied Communications 2000

2010
Jennifer Tam Robert W. Reeder Stuart Schechter

Computer operating systems, and now websites that serve as application platforms, are increasingly adopting stricter application security models; they restrict the resources applications can access to those authorized by the user. Users are asked to authorize access to these resources either when the application is installed or when previously-unauthorized resources are required. For example, F...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید