نتایج جستجو برای: unauthorized exploiters

تعداد نتایج: 4344  

Journal: :E3S web of conferences 2023

Economic advancement of society is accompanied by social phenomena various nature. Hence, there a need for legal regulation such relations: characterization relations; definition the parties, regime matter those relations, plus sanctioning non-performance or improper performance law. The paper discusses legalization unauthorized construction objects that entails to study in theory possibility r...

2004
Souhila Kaci Abdeslam Ali-Laouar Frédéric Cuppens

In this paper, we address the problem of unauthorized inference of confidential information in the field of health care and social information systems. More precisely, we will focus on the problem of inference control of confidential information from statistical databases which contain information about patients and propopse a method based on fuzzy logic to avoid unauthorized inference. Informa...

Journal: :Psychological reports 2014
Reidar Ommundsen Kees Van der Veer Knud S Larsen Dag-Erik Eilertsen

In the U.S. media, unauthorized immigrants are often interchangeably referred to as "illegal aliens," "illegal immigrants," and undocumented immigrants." In spite of formal equivalence, these terms carry different connotations, but the effects of these labels on people's attitudes toward immigrants are not well documented. In this replication study, 274 undergraduate students in psychology resp...

2017
Gaurav Bansal Ellyn Hansen Lijun Chen

Using the attribution Theory, the study examines the relative trust loss in a hacking versus unauthorized information sharing by a Website. An experiment was conducted in which the respondents were asked to view a website and answer questions related to their trust, at two different phases both before and after reading the news scenario. The results of the study show that users experience signi...

Journal: :JIP 2012
Ervianto Abdullah Satoshi Fujita

The objective of Peer-to-Peer Content Delivery Networks is to deliver copyrighted contents to paid clients in an efficient and secure manner. To protect such contents from being distributed to unauthorized peers, Lou and Hwang proposed a proactive content poisoning scheme to restrain an illegal download conducted by unauthorized peers, and a scheme to identify colluders who illegally leak the c...

2007
Mike Burmester Breno de Medeiros

Low-cost RFID tags are already being used for supply chain management and are a promising new technology that can be used to support the security of wireless ubiquitous applications. However current RFID technology is designed to optimize performance, with less attention paid to resilience and security. In this paper we analyze some of the most common types of attack on RFID tags: unauthorized ...

2015
Abhishek Mukherjee

In recent years database security has become one of the major issues in computer security. Database security is concerned with preventing unauthorized and malicious access into a database. A number of mechanisms needed to defend information, such as verification, user privileges, data encryption, and auditing, are available in DBMS. In reality, malicious access of databases by unauthorized user...

2006
Hong-Zhi Zhang Wei-Ming Yeh Wei-Min Yang Rui-Xi Chen

Digital photos are very popular on the Internet; unfortunately, unauthorized distribution and use of these photos is very common. To prevent unauthorized use, an author can place a watermark on the image, but this technology has not been implemented in an embedded system. Without an instant watermark and encryption option on digital cameras and e-albums, the user must manipulate online photos w...

Journal: :CoRR 2011
Aman Chadha Sandeep Gangundi Rishabh Goel Hiren Dave M. Mani Roja

In recent times, communication through the internet has tremendously facilitated the distribution of multimedia data. Although this is indubitably a boon, one of its repercussions is that it has also given impetus to the notorious issue of online music piracy. Unethical attempts can also be made to deliberately alter such copyrighted data and thus, misuse it. Copyright violation by means of una...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید