نتایج جستجو برای: unauthorized access
تعداد نتایج: 329692 فیلتر نتایج به سال:
In this paper1, we propose an observation-based fine grained access control (OFGAC) mechanism where data are made accessible at various level of abstraction according to their sensitivity level. In this setting, unauthorized users are not able to infer the exact content of the data cell containing confidential information, while they are allowed to get partial information out of it, according t...
In this paper, we propose an observation-based fine grained access control (OFGAC) mechanism where data are made accessible at various levels of abstractions according to their sensitivity levels. In this setting, unauthorized users are not able to infer the exact content of the confidential data, while they are allowed to get partial information out of it, according to their access rights. The...
Password-based user identification and authentication in a network-based operating system generally relies upon a single file that contains user information and the encoded or hashed representations of each users’ password. Operating system designers have resorted to various protection schemes to prevent unauthorized access to this single file. These techniques have proved vulnerable to various...
In the paper will be presented a safety and security system based on fingerprint technology. The results suggest a new scenario where the new cars can use a fingerprint sensor integrated in car handle to allow access and in the dashboard as starter button. Introduction One of the most relevant question in the security world is how identify and recognize people not only in some protected areas w...
In recent wireless communication has become more popular because of its flexibility. That is, there is no need of large and complex physical establishment; one can connect with it easily using radio waves. But on the other part it also increases the chance for the unauthorized users to misuse it as there are fewer burdens in connectivity as compared to wired communications. The unauthorized acc...
Multicast is rapidly becoming an important mode of communication as well as a good platform for building group-oriented services. However, to be used for trusted communication, current multicast schemes must be supplemented by mechanisms for protecting traac, controlling participation, and restricting access of unauthorized users to the data exchanged by the participants. In this paper, we cons...
With fast evolving technology, it is necessary to design an efficient security system which can detect unauthorized access on any system. The need of the time is to implement an extremely secure, economic and perfect system for face recognition that can protect our system from unauthorized access. So, in this paper, a robust face recognition system approach is proposed for image decomposition u...
The scrambling scheme is a part of the conditional access system (CAS) that is used to prevent unauthorized access to Pay-TV systems. In this paper, we propose a new scrambling scheme and key distribution scheme. The scrambling scheme is used in conjunction with ordinary encryption techniques, for protecting the digital video streams from unauthorized viewing. A hash function and a pseudo-rando...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید