نتایج جستجو برای: secure access control
تعداد نتایج: 1651441 فیلتر نتایج به سال:
Cloud storage is an incipient technology in today’s world. Lack of security cloud environment one the primary challenges faced these days. This scenario poses new issues and it forms crux current work. The study proposes Secure Interactional Proof System (SIPS) to address this challenge. methodology has a few key essential components listed herewith strengthen such as authentication, confidenti...
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organiza...
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organiza...
Biometric recognition systems based on 3D palmprint captured with optical technology have been widely investigated in the last decade; however, they can provide information about external skin surface only. This limit be overcome by Ultrasound, which allows gaining depth of palm lines and verify liveness sample, making very hard to fake. In this work, a feasible system ultrasound images is prop...
Cloud computing is a heavy appropriated registering standard. In spite of the fact that, distributed computing is a persuasive standard, access control is one of the principle security issues in distributed computing. Various methodologies for secure access control of outsourced information in distributed computing oblige figure content arrangement trait based encryption (CP-ABE), key-approach ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید