نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

2015
Wentao Shang Yingdi Yu Teng Liang Beichuan Zhang Lixia Zhang

The access control problem, including authentication and authorization, is critical to the security and privacy of the IoT networks. In this paper we present NDN-ACE, a lightweight access control protocol for constrained environments over Named Data Networking (NDN). NDN-ACE uses symmetric cryptography to authenticate the actuation commands on the constrained devices but offloads the key distri...

2007
Luke Mirowski Jacky Hartnett

Change of tag ownership compromises the security goals of Radio Frequency Identification (RFID). When an attacker clones or steals an authorized subject’s tag, they are willingly granted access as RFID assumes the owner of a tag is always the authorized entity. We present Deckard, a new approach to preventing change of tag ownership. Deckard uses the principles of intrusion detection to look fo...

2003
Mark Burgess Geoffrey Canright Kenth Engø-Monsen

We describe a model of computer security that applies results from the statistical properties of graphs to human-computer systems. The model attempts to determine a safe threshold of interconnectivity in a human-computer system by ad hoc network analyses. The results can be applied to physical networks, social networks and to networks of clues in a forensic analysis. Access control, intrusions ...

2018

Dependable verification of individuals has transformed into a fundamentally valuable service in a scope of regions, in police or military settings as well as in non-military personnel (civilian) applications, for example, money related exchanges methodology or access control too. Traditional authentication systems rely on either knowledge, such as a password or a PIN number or possession such a...

2003
Yves Deswarte David Horne

This document constitutes the first deliverable of MAFTIA work package 1. The objective of this work package is to define a consistent framework for ensuring the dependability of distributed applications in the face of a wide class of threats. In particular, the aim is to develop a coherent set of concepts for an architecture that can tolerate deliberately malicious faults, such as intrusions, ...

2004
Symeon Chatzinotas Pythagoras Karampiperis Demetrios G. Sampson

Taking into account the constantly increasing number of educational resources available on the Web, the problem arising is to determine who is authorized to access these resources and under which conditions. This problem is addressed by using Digital Rights information, namely information about the rights concerning digital intellectual property. This paper presents the EDMiR web-based environm...

2016
Changbiao Xu Lianjun Zhu

This study presented a non-synchronized random access mechanism that supports dynamicstatic spectrum.Generally, the authorized users of two networks (network A and network B) with different frequency bands communicate with each other by using static spectrum. When congestion happened, spectrum holes in their networkscan be detected by the opposite networksand then utilized to communicate. Based...

2007
Jaume Barceló Boris Bellalta Carlos Macián Miquel Oliver Anna Sfairopoulou

This article describes a mechanism to provide location information about users of a wireless metropolitan access network to trusted and authorized third parties. A case of particular interest is that of providing emergency centers with the location of the VoIP caller. The location information is obtained from the wireless access points using SNMP polling, and stored in a location server. The ou...

2016
Olivier Blazy Xavier Bultel Pascal Lafourcade

Unidirectional proxy re-encryption (PRE) can be used to realize an efficient and secure shared storage. However, this type of storage does not yet protect its users’ privacy: to retrieve some data a user must give his identity and his query to the proxy. We propose two secure data storage systems that allow authorized users to anonymously get access to the content of encrypted data on a storage...

Journal: :Computer Networks 2011
Sulan Wong Eitan Altman Julio Rojas-Mora

Internet growth has allowed unprecedented widespread access to cultural creation including music and films, to knowledge, and to a wide range of consumer information. At the same time, it has become a huge source of business opportunities. Along with great benefits that this access to the Internet provides, the open and free access to the Internet has encountered large opposition based on polit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید