نتایج جستجو برای: unauthorized access
تعداد نتایج: 329692 فیلتر نتایج به سال:
As the prevalence of wireless networking has increased, so has the need for easy-to-use methods of securing wireless networks from abuse by unauthorized users. This paper introduces the distinction between the wireless coverage area of an access point, and the wireless service area, over which a network operator wishes to provide wireless service. This paper also presents Boomerang, a system th...
We are facing a growing user demand for ubiquitous Internet access. As a result, network ports are becoming common in public spaces within buildings such as lounges, conference rooms and lecture halls. This introduces the problem of protecting these public ports from unauthorized use. In this paper, we study the problem of access control for public network ports. We view this problem as a speci...
Cloud computing has emerged as the most dominant computational paradigm in recent times. There are tremendous benefits for enterprises adopting cloud technologies. It provides resources and services on demand, pay-as-you go basis. This includes infrastructure, platform and software services. But there are still a number of security threats and challenges associated with utilizing cloud computin...
Security is essential for e-health system as it provides highly sensitive distributed medical data and exchanged among the healthcare professionals, customers and providers over Internet. Internet is an open access system that allows anyone to participate and access the data. Hence, it is necessary to protect the data, service from the unauthorized visibility, use and also maintain a high degre...
Many companies connect to the Internet, guarded by "firewalls" designed to prevent unauthorized access to their private networks. Despite this general goal, many firewalls fall widely apart on a continuum between ease of use and security. This paper attempts to describe some of the background and tradeoffs in designing firewalls. A vocabulary for firewalls and their components is offered, to pr...
Copyright of the publisher: Intellectual property, in particular copyright (rights in editorial content), trademarks (rights in brands for services or journals), and database rights (rights in compilations of information), form the foundation of Elsevier’s publishing services and communications businesses. We in Elsevier embrace the opportunities the digital environment offers for communication...
Enterprise Wireless Fidelity implementations have complicated requirements for Authentication, Authorization, Accounting (AAA) and detection of unauthorized access. Recent incidents show that unsecured implementations invite severe risk to enterprise network and data (especially for financial and critical sectors). In this paper a secure implementation is proposed which addresses most of the po...
In order to keep the confidential data in the cloud against unauthorized parties, a cryptographic access control solution based on Attribute-Based Encryption (ABE) and Identity-Based Signature (IBS) is introduced in this paper. Under the premise that cloud service provider is untrustful, the proposed scheme can ensure the data security of the cloud storage system in an open environment, as well...
In multi-application Java Cards, applet’s sensitive data must be protected against unauthorized accesses. Applet isolation is normally achieved through the firewall mechanism. The firewall allows an applet to access external objects only through an object sharing mechanism, called shareable interface. Firewall is based on the access control policy and does not control information propagation. T...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید