نتایج جستجو برای: secure access control

تعداد نتایج: 1651441  

Journal: :Computer systems science and engineering 2022

Cloud storage is an incipient technology in today’s world. Lack of security cloud environment one the primary challenges faced these days. This scenario poses new issues and it forms crux current work. The study proposes Secure Interactional Proof System (SIPS) to address this challenge. methodology has a few key essential components listed herewith strengthen such as authentication, confidenti...

2011
Vijayalakshmi Atluri David F. Ferraiolo

While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organiza...

Journal: :CoRR 2008
David F. Ferraiolo D. Richard Kuhn

While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organiza...

Journal: :International Journal of Advanced Computer Science and Applications 2020

Journal: :International Journal of Information and Network Security (IJINS) 2012

Journal: :IEEE Access 2021

Biometric recognition systems based on 3D palmprint captured with optical technology have been widely investigated in the last decade; however, they can provide information about external skin surface only. This limit be overcome by Ultrasound, which allows gaining depth of palm lines and verify liveness sample, making very hard to fake. In this work, a feasible system ultrasound images is prop...

2014

Cloud computing is a heavy appropriated registering standard. In spite of the fact that, distributed computing is a persuasive standard, access control is one of the principle security issues in distributed computing. Various methodologies for secure access control of outsourced information in distributed computing oblige figure content arrangement trait based encryption (CP-ABE), key-approach ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید