نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

Journal: :C&RL 2010
Xiaohua Zhu Kristin R. Eschenfelder

Xiaohua Zhu is a Ph.D. candidate in the School of Library and Information Studies at the University of Wisconsin-Madison; e-mail: [email protected]. Kristin R. Eschenfelder is Associate Professor in the School of Library and Information Studies at the University of Wisconsin-Madison; e-mail: eschenfelder@wisc. edu. © Xiaohua Zhu and Kristin R. Eschenfelder This paper analyzes changes to the defini...

2000
Mukesh K. Mohania Vijay Kumar Yahiko Kambayashi Bharat K. Bhargava

In ‘this paper we discuss various secured web access schemes using dynamic and static approaches. In a static approach the access environment, that is, set of authorized users, the mode of access, their access rights, etc., are predefined. This approach is suitable only for a static set up where the user requirements do not change frequently. In the dynamic approach, on the other hand, the auth...

Journal: :The Annals of Iowa 2020

Journal: :CoRR 2004
Sudhir Kumar Singh R. Srikanth

A restriction on quantum secret sharing (QSS) that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets is permissible, provid...

2004
Sean Smith Nicholas C. Goffee Sung Hoon Kim Punch Taylor Meiyuan Zhao John Marchesini

Wireless networks break the implicit assumptions that supported authorization in wired networks (that is: if one could connect, then one must be authorized). However, ensuring that only authorized users can access a campus-wide wireless network creates many challenges: we must permit authorized guests to access the same network resources that internal users do; we must accommodate the de-centra...

Journal: :JCP 2006
Judith E. Y. Rossebø Rolv Bræk

During the past decade, the telecommunication environment has evolved from single operator featuring voice services to multi-operator featuring a range of different types of services. Services are being provided today in a distributed manner in a connectionless environment requiring cooperation of several components and actors. This paper focuses on the incremental means to ensure access to ser...

2006
Ian Molloy Radu Dondera Umang Sharan Elisa Bertino

RBAC or Role-Based Access Control is an approach to restrict system access to authorized users and help in implementing a secure access control for larger databases. MySQL is a popular open source relational database management system (RDBMS) which currently implements MAC and DAC access control mechanisms. We extend the access control policies in MySQL by adding the Core RBAC functionality to it.

Journal: :Computer and Information Science 2009
Chungen Xu Sheng Gong

Role-based access control(RBAC) is a promising technology for managing and enforcing security in large-scale enterprise-wide system, and we were motivated by the need to manage and enforce the strong access control technology of RBAC in large-scale Web environments. Majority of traditional access control models were passive data-protections, which were not suitable for large and complex multi-u...

2012
Christer Idland Thomas Jelle Stig Fr. Mjølsnes

Many wireless Internet access operators prefer open local area network (WLAN) access because this reduces the need for user assistance for a variety of smaller devices. A 802.11 MAC spoofer masquerades as an authorized user and gains access by using an already whitelisted MAC address. We consider the scenario where the spoofer waits until the authorized user has finished the session, and then u...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید