نتایج جستجو برای: Access Control

تعداد نتایج: 1607635  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :isecure, the isc international journal of information security 0
m. safarzadeh m. taghizadeh b. zamani b. tork ladani

one of the main requirements for providing software security is the enforcement of access control policies, which is sometimes referred to as the heart of security. the main purpose of access control policies is to protect resources of the system against unauthorized accesses. any error in the implementation of access control policies may lead to undesirable outcomes. hence, we should ensure th...

Journal: :journal of advances in computer research 2013
somayeh rahmani ahmad khademzadeh amir masoud eftekhari moghadam

in recent years, many researchers have been done in the area of wireless sensornetworks that has led to the variety of algorithms and methods for the collection andtransmission of environment information; but still many challenges faced bywireless sensor networks using methodologies are applied in various fields. such asmedia access control that due to the media being shared on these networks, ...

2011
Vijayalakshmi Atluri David F. Ferraiolo

While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organiza...

1996
Ravi Sandhu George Mason

2 Abstract Role-based access control (RBAC) is a promising alternative to traditional discretionary and mandatory access controls. In RBAC permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. In this paper we formally show that lattice-based mandatory access controls can be enforced by appropriate connguration of RBAC c...

2017
M. H. Harrison W. L. Ruzzo

Access Control is the process or mechanism for giving the authority to access the specific resources, applications and system. Access control defines a set of conditions or criteria to access the system and its resources. There are three main accesses Control model first is Mandatory access control model, second is Discretionary access control model and third is Role based access control models...

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

Journal: :CoRR 2008
David F. Ferraiolo D. Richard Kuhn

While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organiza...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید