نتایج جستجو برای: multilevel security

تعداد نتایج: 204436  

Journal: :Int. Arab J. e-Technol. 2009
Abdulameer Hussain

This paper presents a proposed multilevel authentication method which is implemented especially in sensitive applications where they contain multilevel secure and confidential data. The proposed method divides the system into multiple sensitive levels and tests users against different authentication methods for each level. Most levels are subdivided further into secure sublevels. Each sublevel ...

2010
MARTIN MORGAN STEVE ROWLINSON

An integrative multilevel model of empowerment and job performance behaviours is advanced, building on Social Cognitive Theory (SCT). Empowerment climate is hypothesized as influencing individual and team performance behaviours directly and partially through individual and team (psychological) empowerment. Using survey responses from 380 individuals, nested in 115 project management teams, we t...

Journal: :Computers & Security 1994
Bhavani M. Thuraisingham

This paper describes security issues for federated database management systems set up for managing distributed, heterogeneous and autonomous multilevel databases. It builds on our previous work in multilevel secure distributed database management systems and on the results of others’ work in federated database systems. In particular, we define a multilevel secure federated database system and d...

2006
Simon N. Foley Stefano Bistarelli Barry O'Sullivan John Herbert Garret Swart

Constraining how information may flow within a system is at the heart of many protection mechanisms and many security policies have direct interpretations in terms of information flow and multilevel security style controls. However, while conceptually simple, multilevel security controls have been difficult to achieve in practice. In this paper we explore how the traditional assurance measures ...

1990
Vijay Varadharajan Stewart Black

multilevel security, information flow, object model It often suggested that distributed computing will be the major trend in computer systems during the next decade. However, distributed systems are vulnerable to a number of security attacks. In this paper we look at the security problems of object-based distributed systems, and propose a model based on labeling for multilevel security. The pur...

2012
Stefano Fasciani Lonce L. Wyse

Sound generators and synthesis engines expose a large set of parameters, allowing run-time timbre morphing and exploration of sonic space. However, control over these high-dimensional interfaces is constrained by the physical limitations of performers. In this paper we propose the exploitation of vocal gesture as an extension or alternative to traditional physical controllers. The approach uses...

Journal: :International Journal of Advanced Computer Science and Applications 2011

Journal: :IEEE Transactions on Software Engineering 1987

Journal: :IEEE Security & Privacy 2004
O. Sami Saydjari

today? If there is still a need, how might we address it? To define multilevel security, we must first define security, which is “the combination of confidentiality (the prevention of the unauthorized disclosure of information), integrity (the prevention of the unauthorized amendment or deletion of information), and availability (the prevention of the unauthorized withholding of information).” ...

2005
Ramzi A. Haraty

Transaction-processing systems (TPS) are becoming increasingly more available as commercial products. However, the approaches to the issues associated with using TPS in multilevel secure environments are still in the research stage. In this article, we address the issues of multilevel security in distributed transaction-processing systems. A distributed transaction-processing system (DTPS) is a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید