نتایج جستجو برای: access control
تعداد نتایج: 1607635 فیلتر نتایج به سال:
Nowadays, the Zero Trust model has become one of standard security models. This paradigm stipulates as mandatory protection each endpoint, looking for providing to all network. To meet this end, it is necessary guarantee integrity access control systems. One possibility bringing different endpoints continuous authentication, an system. Continuous authentication set technologies capable determin...
Tripunitara, Mahesh V. Ph.D., Purdue University, December, 2005. A Theory Based on Security Analysis for Comparing the Expressive Power of Access Control Models. Major Professor: Ninghui Li. We present a theory for comparing the expressive power of access control models. Our theory is based on reductions that preserve the results of security analysis. Security analysis is an approach to the ver...
The rapid technological change and uncertain future evolutions have a large impact on investment projects in the telecommunication sector. When new infrastructure networks are rolled out, the initial assumptions can prove to be untrue in the future, severely impacting the payoff. It is therefore extremely important that projects offer flexibility to allow the management to react to unforeseen c...
Over the last few years researchers have recognized the need for adaptive access control mechanisms for dynamic collaborative environments. As a result, several mechanisms have been proposed and demonstrated in academic literature. Although these mechanisms have been verified to perform as advertised, few of them have been validated to work within an operational environment. Using a decentraliz...
NOTICE: This is the author's version of a work accepted for publication by Elsevier. Changes resulting from the publishing process, including peer review, editing, corrections, structural formatting and other quality control mechanisms, may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently pub...
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
1 Access Control 3 Sabrina De Capitani di Vimercati, Pierangela Samarati, and Ravi Sandhu 1.
ii
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید