User Authorization at the Molecular Scale

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

User-Oriented Authorization in Collaborative Environments

Access rights for collaborative systems tend to be rather complex, leading to difficulties in the presentation and manipulation of access policies at the user interface level. We confront a theoretical access rights model with the results of a field study which investigates how users specify access policies. Our findings suggest that our theoretical model addresses most of the issues raised by ...

متن کامل

sayI: Trusted User Authentication at Internet Scale

With Internet-scale user authentication, an organization authenticates users with which it has no prior association. Of necessity, the organization must rely on third parties, which make up the authentication infrastructure and can vouch for these users. These third parties are trusted. And since different organizations have different adversaries and different security needs, it is up to the or...

متن کامل

Pressure solution at the molecular scale.

The topological evolution of the cleavage surface of a gypsum single crystal during its dissolution in a flowing undersaturated aqueous solution has been observed with an atomic force microscope. The matter transfer from solid to liquid proceeds through the migration of atomic steps. The step velocity has been measured and appears to depend on the force applied by the tip on the surface. Wherea...

متن کامل

User Authentication and Authorization in the Java(tm) Platform

JavaTM security technology originally focused on creating a safe environment in which to run potentially untrusted code downloaded from the public network. With the latest release of the JavaTM Platform (the JavaTM 2 Software Development Kit, v 1.2), fine-grained access controls can be placed upon critical resources with regard to the identity of the running applets and applications, which are ...

متن کامل

SmartAuth: User-Centered Authorization for the Internet of Things

Internet of Things (IoT) platforms often require users to grant permissions to third-party apps, such as the ability to control a lock. Unfortunately, because few users act based upon, or even comprehend, permission screens, malicious or careless apps can become overprivileged by requesting unneeded permissions. To meet the IoT’s unique security demands, such as cross-device, context-based, and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ChemPhysChem

سال: 2017

ISSN: 1439-4235

DOI: 10.1002/cphc.201700506