نتایج جستجو برای: unauthorized access
تعداد نتایج: 329692 فیلتر نتایج به سال:
Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card responds to query/interrogation irrespective of ‘Who’ holds the Card; like a key to a door. Since an attacker can possess the card, access to such object can therefore be easily compromised. This security breach is clas...
With the increasing popularity of online social networks (OSNs) and the ability to access and exchange sensitive user information, user privacy concerns become an important issue which have attracted the attention of researchers and policymakers. For example, deleted pictures or pictures in deleted posts may not be deleted from the OSN server immediately, and hence accessible to another unautho...
With the explosive growth in the Internet, network security has become an inevitable concern for any organization whose internal private network is connected to the Internet. Network security is setup to guard against unauthorized access, alteration, or modification of information, and unauthorized denial of service. When a network is connected to the network that is vulnerable to potential int...
In this paper we discuss the problem of collaborative monitoring of unauthorized persons, trying to deceive a face recognition based admission control system. We propose an efficient collaborative scheme, based on the TPP algorithm proposed in [2], that relies on probabilistic local information flooding. Combining their collective knowledge, the various units of the system can identify maliciou...
A wide-range of personal and sensitive information are stored in users’ online accounts. Losing access, or an unauthorized access to one those accounts could put them into the risks privacy breach, cause financial loss, compromise their accessibility important documents. large body prior work focused on developing new schemes strategies protect security. However, there is a dearth existing lite...
With!the!discovery!of!admin!backdoors!in!network!devices!of!Barracuda!in!January! last!year,!it!once!again!has!become!apparent!that!internetPfacing!network!devices! are!vulnerable!to!unauthorized!remote!access.!It!was!found!that!80%!of!bestPselling! routers!have!security!vulnerabilities!that!may!be!exploited!to!gain!unauthorized! remote!access.!With!increasing!reports!of!router!vulnerabilities!...
Consumer disposition to the information quality of the website, trust, privacy concerns, reputation, security concerns, and the company’s reputation have strong effects on Internet consumers’ trust in the website. Major two critical problems for both e-commerce consumers and sites are privacy and security. Privacy is the control over one’s personal data whereas; security is the attempted access...
Picture archiving and communication systems (PACS) are typical information systems, which may be undermined by unauthorized users who have illegal access to the systems. This paper proposes a role-based access control framework comprising two main components – a content-based steganographic module and a reversible watermarking module, to protect mammograms on PACSs. Within this framework, the c...
In the secure domain computing environments, it is important to keep resources and information integrity from unauthorized access. Therefore, there is a strong demand on the access control for shared resources. In the past few years, Role-based Access Control (RBAC) has been introduced and offered a powerful means of specifying access control decisions. In this paper, an Object Oriented RBAC mo...
Currently, most enterprise intranet systems process user information for security and access authentication purposes. However, this information is often captured by unauthorized users who may edit, modify, delete or otherwise corrupt this ∗ corresponding author 420 M. Lee, N.-D. Cho, K.-K. Lee, K.-S. Ko data. In addition, corruption can result from inaccurate communication protocols in the web ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید