نتایج جستجو برای: unauthorized exploiters
تعداد نتایج: 4344 فیلتر نتایج به سال:
Economic advancement of society is accompanied by social phenomena various nature. Hence, there a need for legal regulation such relations: characterization relations; definition the parties, regime matter those relations, plus sanctioning non-performance or improper performance law. The paper discusses legalization unauthorized construction objects that entails to study in theory possibility r...
In this paper, we address the problem of unauthorized inference of confidential information in the field of health care and social information systems. More precisely, we will focus on the problem of inference control of confidential information from statistical databases which contain information about patients and propopse a method based on fuzzy logic to avoid unauthorized inference. Informa...
In the U.S. media, unauthorized immigrants are often interchangeably referred to as "illegal aliens," "illegal immigrants," and undocumented immigrants." In spite of formal equivalence, these terms carry different connotations, but the effects of these labels on people's attitudes toward immigrants are not well documented. In this replication study, 274 undergraduate students in psychology resp...
Using the attribution Theory, the study examines the relative trust loss in a hacking versus unauthorized information sharing by a Website. An experiment was conducted in which the respondents were asked to view a website and answer questions related to their trust, at two different phases both before and after reading the news scenario. The results of the study show that users experience signi...
The objective of Peer-to-Peer Content Delivery Networks is to deliver copyrighted contents to paid clients in an efficient and secure manner. To protect such contents from being distributed to unauthorized peers, Lou and Hwang proposed a proactive content poisoning scheme to restrain an illegal download conducted by unauthorized peers, and a scheme to identify colluders who illegally leak the c...
Low-cost RFID tags are already being used for supply chain management and are a promising new technology that can be used to support the security of wireless ubiquitous applications. However current RFID technology is designed to optimize performance, with less attention paid to resilience and security. In this paper we analyze some of the most common types of attack on RFID tags: unauthorized ...
In recent years database security has become one of the major issues in computer security. Database security is concerned with preventing unauthorized and malicious access into a database. A number of mechanisms needed to defend information, such as verification, user privileges, data encryption, and auditing, are available in DBMS. In reality, malicious access of databases by unauthorized user...
Digital photos are very popular on the Internet; unfortunately, unauthorized distribution and use of these photos is very common. To prevent unauthorized use, an author can place a watermark on the image, but this technology has not been implemented in an embedded system. Without an instant watermark and encryption option on digital cameras and e-albums, the user must manipulate online photos w...
In recent times, communication through the internet has tremendously facilitated the distribution of multimedia data. Although this is indubitably a boon, one of its repercussions is that it has also given impetus to the notorious issue of online music piracy. Unethical attempts can also be made to deliberately alter such copyrighted data and thus, misuse it. Copyright violation by means of una...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید