نتایج جستجو برای: unauthorized access

تعداد نتایج: 329692  

2010
Raju Halder Agostino Cortesi R. Halder A. Cortesi

In this paper1, we propose an observation-based fine grained access control (OFGAC) mechanism where data are made accessible at various level of abstraction according to their sensitivity level. In this setting, unauthorized users are not able to infer the exact content of the data cell containing confidential information, while they are allowed to get partial information out of it, according t...

2013
Raju Halder Agostino Cortesi

In this paper, we propose an observation-based fine grained access control (OFGAC) mechanism where data are made accessible at various levels of abstractions according to their sensitivity levels. In this setting, unauthorized users are not able to infer the exact content of the confidential data, while they are allowed to get partial information out of it, according to their access rights. The...

2002
Christopher Roth Craig Rasmussen

Password-based user identification and authentication in a network-based operating system generally relies upon a single file that contains user information and the encoded or hashed representations of each users’ password. Operating system designers have resorted to various protection schemes to prevent unauthorized access to this single file. These techniques have proved vulnerable to various...

Journal: :CoRR 2003
Gerardo Iovane Paola Giordano Costanza Iovane Fabrizio Rotulo

In the paper will be presented a safety and security system based on fingerprint technology. The results suggest a new scenario where the new cars can use a fingerprint sensor integrated in car handle to allow access and in the dashboard as starter button. Introduction One of the most relevant question in the security world is how identify and recognize people not only in some protected areas w...

2014
Rajendra Sharma

In recent wireless communication has become more popular because of its flexibility. That is, there is no need of large and complex physical establishment; one can connect with it easily using radio waves. But on the other part it also increases the chance for the unauthorized users to misuse it as there are fewer burdens in connectivity as compared to wired communications. The unauthorized acc...

1994
Li Gong Nachum Shacham

Multicast is rapidly becoming an important mode of communication as well as a good platform for building group-oriented services. However, to be used for trusted communication, current multicast schemes must be supplemented by mechanisms for protecting traac, controlling participation, and restricting access of unauthorized users to the data exchanged by the participants. In this paper, we cons...

2013
Prachi Agarwal Naveen Prakash

With fast evolving technology, it is necessary to design an efficient security system which can detect unauthorized access on any system. The need of the time is to implement an extremely secure, economic and perfect system for face recognition that can protect our system from unauthorized access. So, in this paper, a robust face recognition system approach is proposed for image decomposition u...

2001
Wachiwan Kanjanarin Thumrongrat Amornraksa

The scrambling scheme is a part of the conditional access system (CAS) that is used to prevent unauthorized access to Pay-TV systems. In this paper, we propose a new scrambling scheme and key distribution scheme. The scrambling scheme is used in conjunction with ordinary encryption techniques, for protecting the digital video streams from unauthorized viewing. A hash function and a pseudo-rando...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید