نتایج جستجو برای: authorized access

تعداد نتایج: 331905  

2013
Nabil Giweli Seyed Shahrestani Hon Cheung

There is a growing interest in cloud computing due to its various benefits such as the efficient utilization of computing resources. However, privacy and security concerns are among the main obstacles facing the widespread adoption of this new technology. For instance, it is more desirable for many potential organizations and users that privacy protections and access authorizations on their dat...

2009
Y. C. CHEN C. H. LIN Y. C. Chen C. H. Lin

IEEE 802.11 WLANs are widely deployed nowadays. While a mobile device is moving around it may need to execute a handoff that usually requires authentication. This results in a long processing delay and leads to degradation of quality of service to the mobile device. Existing authentication methods such as AAA and IEEE 802.1x mechanisms are unable to accommodate low-latency handoff. In this arti...

2014
Jie Shi Junzuo Lai Yingjiu Li Robert H. Deng Jian Weng

Cloud computing has drawn much attention from research and industry in recent years. Plenty of enterprises and individuals are outsourcing their data to cloud servers. As those data may contain sensitive information, it should be encrypted before outsourced to cloud servers. In order to ensure that only authorized users can search and further access the encrypted data, two important capabilitie...

Journal: :Data Knowl. Eng. 1998
Elisa Bertino Elena Ferrari

Maintaining data quality is an important requirement in any organization. It requires measures for access control, semantic integrity, fault tolerance, and recovery. Access control regulates the access to the system by users to ensure that all accesses are authorized according to some specified policies. In this paper, we briefly survey the state of the art in access control for database system...

Journal: :DEStech Transactions on Economics and Management 2016

2012
Abdul Raouf Khan

Cloud computing is one of the emerging technologies. The cloud environment is a large open distributed system. It is important to preserve the data, as well as, privacy of users. Access Control methods ensure that authorized user’s access the data and the system. This paper discusses various features of attribute based access control mechanism, suitable for cloud computing environment. It leads...

2015
Jason Crampton Naomi Farley Gregory Gutin Mark Jones Bertram Poettering

Cryptographic access control has been studied for over 30 years and is now a mature research topic. When symmetric cryptographic primitives are used, each protected resource is encrypted and only authorized users should have access to the encryption key. By treating the keys themselves as protected resources, it is possible to develop schemes in which authorized keys are derived from the keys e...

Journal: :Croatian Medical Journal 2010

2014
Ramandeep Kaur Anshuman Sharma Anurag Gupta Jagmohan Mago Elisa Bertino Ravi Sandhu Jiping Xiong Lifeng Xuan Jian Zhao Tao Huang Shelly Rohilla Pradeep Kumar Mittal Shamkant B. Navathe

A database-management system (DBMS) is a collection of correlated data and a set of programs to access correlated data. The collection of data, usually referred to as the database, contains information able to an enterprise. And hence the concept of security lies with-in. As the database contains all information relevant to particular enterprise, so it's very important to be in safe side t...

1993
R. S. Sandhu

Historically, the access control problem has been couched within the framework of subjects, object, and rights. In this paper we argue for a newer paradigm for distributed and multi-system applications, that transcends the subject-object view of access control. This new paradigm views access control and authorization not in terms of individual subjects and object, but rather in terms of long-li...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید