نتایج جستجو برای: unauthorized access

تعداد نتایج: 329692  

Journal: :CoRR 2012
Ikuesan R. Adeyemi Norafida Ithnin

Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card responds to query/interrogation irrespective of ‘Who’ holds the Card; like a key to a door. Since an attacker can possess the card, access to such object can therefore be easily compromised. This security breach is clas...

2015
Shangqi Lai Joseph K. Liu Kim-Kwang Raymond Choo Kaitai Liang

With the increasing popularity of online social networks (OSNs) and the ability to access and exchange sensitive user information, user privacy concerns become an important issue which have attracted the attention of researchers and policymakers. For example, deleted pictures or pictures in deleted posts may not be deleted from the OSN server immediately, and hence accessible to another unautho...

2012
Gunjan Gupta Rama Chawla

With the explosive growth in the Internet, network security has become an inevitable concern for any organization whose internal private network is connected to the Internet. Network security is setup to guard against unauthorized access, alteration, or modification of information, and unauthorized denial of service. When a network is connected to the network that is vulnerable to potential int...

2010
Sagi Ben-Moshe

In this paper we discuss the problem of collaborative monitoring of unauthorized persons, trying to deceive a face recognition based admission control system. We propose an efficient collaborative scheme, based on the TPP algorithm proposed in [2], that relies on probabilistic local information flooding. Combining their collective knowledge, the various units of the system can identify maliciou...

Journal: :Lecture Notes in Computer Science 2021

A wide-range of personal and sensitive information are stored in users’ online accounts. Losing access, or an unauthorized access to one those accounts could put them into the risks privacy breach, cause financial loss, compromise their accessibility important documents. large body prior work focused on developing new schemes strategies protect security. However, there is a dearth existing lite...

2017

With!the!discovery!of!admin!backdoors!in!network!devices!of!Barracuda!in!January! last!year,!it!once!again!has!become!apparent!that!internetPfacing!network!devices! are!vulnerable!to!unauthorized!remote!access.!It!was!found!that!80%!of!bestPselling! routers!have!security!vulnerabilities!that!may!be!exploited!to!gain!unauthorized! remote!access.!With!increasing!reports!of!router!vulnerabilities!...

2016
Palak Gupta Akshat Dubey

Consumer disposition to the information quality of the website, trust, privacy concerns, reputation, security concerns, and the company’s reputation have strong effects on Internet consumers’ trust in the website. Major two critical problems for both e-commerce consumers and sites are privacy and security. Privacy is the control over one’s personal data whereas; security is the attempted access...

Journal: :IJDCF 2009
Chang-Tsun Li Yue Li Chia-Hung Wei

Picture archiving and communication systems (PACS) are typical information systems, which may be undermined by unauthorized users who have illegal access to the systems. This paper proposes a role-based access control framework comprising two main components – a content-based steganographic module and a reversible watermarking module, to protect mammograms on PACSs. Within this framework, the c...

Journal: :I. J. Network Security 2007
Cungang Yang

In the secure domain computing environments, it is important to keep resources and information integrity from unauthorized access. Therefore, there is a strong demand on the access control for shared resources. In the past few years, Role-based Access Control (RBAC) has been introduced and offered a powerful means of specifying access control decisions. In this paper, an Object Oriented RBAC mo...

Journal: :Computing and Informatics 2011
Malrey Lee Nam-Deok Cho Keun Kwang Lee Kyoung Sook Ko

Currently, most enterprise intranet systems process user information for security and access authentication purposes. However, this information is often captured by unauthorized users who may edit, modify, delete or otherwise corrupt this ∗ corresponding author 420 M. Lee, N.-D. Cho, K.-K. Lee, K.-S. Ko data. In addition, corruption can result from inaccurate communication protocols in the web ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید