نتایج جستجو برای: unauthorized access
تعداد نتایج: 329692 فیلتر نتایج به سال:
Secure buildings are currently protected from unauthorized access by a variety of devices. Even though there are many kinds of devices to guarantee the system safety such as PIN pads, keys both conventional and electronic, identity cards, cryptographic and dual control procedures, the people voice can also be used. The ability to verify the identity of a speaker by analyzing speech, or speaker ...
In order to solve the problem of unwanted access to systems, we proposed a Text Dependent Speaker Identification System that uses two features to keep out intruders. If a user wanted to gain access, both the userÕs voice and his/her personal password will need to be recognized and authenticated by the security system. Even if an unauthorized user could obtain a sample of an authorized userÕs vo...
The trend in the information area is to provide integrated access to diverse and dynamic information sources. We present a modeling and architectural solution to the problem of data integration from heterogeneous data sources based on the use of wrappers and mediators. The mediator supports integrated query processing by the semantic mapping between the global schema type and the local schema t...
Database security encompasses three main properties: confidentiality, integrity and availability. Roughly speaking, the confidentiality property enforces predefined restrictions while accessing the protected data, thus preventing disclosure to unauthorized persons. The integrity property guarantees that the data cannot be corrupted in an invisible way. Finally, the availability property ensures...
This white paper outlines how EMC CloudArray uses best practices for protecting data in the cloud from unauthorized access and maintaining data integrity. By using these guidelines as a basis, you can make data storage in the cloud as secure or, surprisingly, even more secure than local storage.
As the demand for data and information management increases, there is also a critical need for maintaining the security of the databases, applications and information systems. Data and information have to be protected from unauthorized access as well as from malicious corruption. With the advent of the web it is even more important to protect data and information as numerous individuals have ac...
Protecting computational resources and digital information against unauthorized access is one of the fundamental security requirements in modern computer systems. Usage control addresses the control of computational resources after access has been granted. Despite its fundamental importance, no systematic methods exist to implement formal usage control specifications. This paper presents a mode...
Accessing computer resources from off campus has been a continuing problem for both students and faculty, and this problem has been exacerbated by the growth of our graduate program. A multi-layered remote authentication system has been created for use by students and faculty providing the ability to telecommute and gain remote access to these resources. Security concerns have also been address...
The proposed work aims to enhance authorization and authentication process by using multilevel authentication to protect cloud from malicious user and unauthorized access, implement security measure to protect data of users stored in cloud environment. It will also provide service level security. Also user based access control is applied over user's data so that user can grant, revoke sharing p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید