نتایج جستجو برای: authorized access
تعداد نتایج: 331905 فیلتر نتایج به سال:
Xiaohua Zhu is a Ph.D. candidate in the School of Library and Information Studies at the University of Wisconsin-Madison; e-mail: [email protected]. Kristin R. Eschenfelder is Associate Professor in the School of Library and Information Studies at the University of Wisconsin-Madison; e-mail: eschenfelder@wisc. edu. © Xiaohua Zhu and Kristin R. Eschenfelder This paper analyzes changes to the defini...
In ‘this paper we discuss various secured web access schemes using dynamic and static approaches. In a static approach the access environment, that is, set of authorized users, the mode of access, their access rights, etc., are predefined. This approach is suitable only for a static set up where the user requirements do not change frequently. In the dynamic approach, on the other hand, the auth...
A restriction on quantum secret sharing (QSS) that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets is permissible, provid...
Wireless networks break the implicit assumptions that supported authorization in wired networks (that is: if one could connect, then one must be authorized). However, ensuring that only authorized users can access a campus-wide wireless network creates many challenges: we must permit authorized guests to access the same network resources that internal users do; we must accommodate the de-centra...
During the past decade, the telecommunication environment has evolved from single operator featuring voice services to multi-operator featuring a range of different types of services. Services are being provided today in a distributed manner in a connectionless environment requiring cooperation of several components and actors. This paper focuses on the incremental means to ensure access to ser...
RBAC or Role-Based Access Control is an approach to restrict system access to authorized users and help in implementing a secure access control for larger databases. MySQL is a popular open source relational database management system (RDBMS) which currently implements MAC and DAC access control mechanisms. We extend the access control policies in MySQL by adding the Core RBAC functionality to it.
Role-based access control(RBAC) is a promising technology for managing and enforcing security in large-scale enterprise-wide system, and we were motivated by the need to manage and enforce the strong access control technology of RBAC in large-scale Web environments. Majority of traditional access control models were passive data-protections, which were not suitable for large and complex multi-u...
Many wireless Internet access operators prefer open local area network (WLAN) access because this reduces the need for user assistance for a variety of smaller devices. A 802.11 MAC spoofer masquerades as an authorized user and gains access by using an already whitelisted MAC address. We consider the scenario where the spoofer waits until the authorized user has finished the session, and then u...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید