منابع مشابه
User-Oriented Authorization in Collaborative Environments
Access rights for collaborative systems tend to be rather complex, leading to difficulties in the presentation and manipulation of access policies at the user interface level. We confront a theoretical access rights model with the results of a field study which investigates how users specify access policies. Our findings suggest that our theoretical model addresses most of the issues raised by ...
متن کاملsayI: Trusted User Authentication at Internet Scale
With Internet-scale user authentication, an organization authenticates users with which it has no prior association. Of necessity, the organization must rely on third parties, which make up the authentication infrastructure and can vouch for these users. These third parties are trusted. And since different organizations have different adversaries and different security needs, it is up to the or...
متن کاملPressure solution at the molecular scale.
The topological evolution of the cleavage surface of a gypsum single crystal during its dissolution in a flowing undersaturated aqueous solution has been observed with an atomic force microscope. The matter transfer from solid to liquid proceeds through the migration of atomic steps. The step velocity has been measured and appears to depend on the force applied by the tip on the surface. Wherea...
متن کاملUser Authentication and Authorization in the Java(tm) Platform
JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release of the JavaTM Platform (the JavaTM 2 Software Development Kit, v 1.2), fine-grained access controls can be placed upon critical resources with regard to the identity of the running applets and applications, which are ...
متن کاملSmartAuth: User-Centered Authorization for the Internet of Things
Internet of Things (IoT) platforms often require users to grant permissions to third-party apps, such as the ability to control a lock. Unfortunately, because few users act based upon, or even comprehend, permission screens, malicious or careless apps can become overprivileged by requesting unneeded permissions. To meet the IoT’s unique security demands, such as cross-device, context-based, and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ChemPhysChem
سال: 2017
ISSN: 1439-4235
DOI: 10.1002/cphc.201700506