نتایج جستجو برای: Authorized Access

تعداد نتایج: 331905  

M. M. Shahmoradian, M. Marcokova O. V. Chernoyarov Y. E. Korchagin

We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized acce...

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

Journal: :International journal of electrical and computer engineering systems 2022

The security and privacy issues regarding outsourcing data have risen significantly as cloud computing has grown in demand. Consequently, since management been delegated to an untrusted server the phase, access control identified a major problem storage systems. To overcome this problem, paper, of using Attribute-Based Access Control (ABAC) approach is utilized. First, must be stored strong for...

2010
Jason Crampton Charles Morisset

Delegation is a widely used and widely studied mechanism in access control systems. Delegation enables an authorized entity to nominate another entity as its authorized proxy for the purposes of access control. Existing delegation mechanisms tend to rely on manual processes initiated by end-users. We believe that systems in which the set of available, authorized entities fluctuates considerably...

2014
P. BRAHMANKAR

Network in which the unauthorised users are permitted to use vacant quotas of the authorized spectrum for their communication without interrupting the communications of the authorized Users is called Cognitive Radio Networks. But According to the spectrum heterogeneity phenomenon, for the unauthorized users Channel availability is variable, due to the licensed user’s activity. Due to this, it i...

2016
T. Monika S. JayaPrakash

Access Control Mechanisms (ACM) are used to ensure that only authorized information is available to users. However, sensitive information can still be misused by authorized users to compromise the privacy of consumers. The concept of privacy-preservation for sensitive data can require the enforcement of privacy policies or the protection against identity disclosure by satisfying some privacy re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید