نتایج جستجو برای: administrator

تعداد نتایج: 4932  

2012
Nuno Santos Rodrigo Rodrigues Bryan Ford

The consequences of security breaches due to system administrator errors can be catastrophic. Software systems in general, and OSes in particular, ultimately depend on a fully trusted administrator whom is granted superuser privileges that allow him to fully control the system. Consequently, an administrator acting negligently or unethically can easily compromise user data in irreversible ways ...

Journal: :CoRR 2017
Aidin Ferdowsi Walid Saad Narayan B. Mandayam

Securing the physical components of a city’s interdependent critical infrastructure (ICI) such as power, natural gas, and water systems is a challenging task due to their interdependence and large number of involved sensors. Using a novel integrated state-space model that captures the interdependence, a two-stage cyber attack on ICI is studied in which the attacker first compromises the ICI’s s...

2003
Yong-Sork HER Kouichi SAKURAI

Recently, many e-voting systems have been proposed for successful election. It should be satisfied many requirements for successful e-voting. In this paper, we propose the ballot-cancellation scheme in order to manage invalid ballots. Many proposed e-voting systems have been proposed without considering invalid ballots. It can be happened an invalid ballot during e-voting, and then we should co...

2007
Ibrahiem M. M. El Emary Salam A. Najim Musbah Aqel

This paper aimed to design and implement a new hybrid intelligent technique called expert network. The main purpose of this expert network is to use it as a management tool assist network administrator in his job regarding the monitoring process of network performance. Here, the management task that uses this expert network was how to detect a fault (i.e. fault detection) that may be occurred o...

2007
Mark Burgess Karst Koymans

We report on and discuss our experiences with teaching Network and System Administration at the level of Masters at Oslo University College and the University of Amsterdam. At our respective institutions we have independently arrived at very similar models for teaching a traditionally vocational subject within an academic Computer Science framework by incorporating a strong practical component.

Journal: :RFC 1999
Sally Hambridge Albert Lunde

This document explains why mass unsolicited electronic mail messages are harmful in the Internetworking community. It gives a set of guidelines for dealing with unsolicited mail for users, for system administrators, news administrators, and mailing list managers. It also makes suggestions Internet Service Providers might follow.

2000
John D. Strunk Garth R. Goodson Michael L. Scheinholtz Craig A. N. Soules Gregory R. Ganger

Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep old versions of data for a window of time, regardless of the commands received from potentially compromised host operating systems. Within the window, system administrators have this valuable infor...

2003
Xianfeng Zhang Qi Li Yong Zhang

s The advert of ECommerce brings an ultimate revolution to various industries. Due to its interior traits of securities industry, it stands in the first line of ECommerce. However the Securities Electronic Commerce (SECommerce) development in China lags far behind that of o ther developed countries and regions. There are verified factors. Here in the paper, the author stands in macroscopical, c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید