نتایج جستجو برای: authorized access
تعداد نتایج: 331905 فیلتر نتایج به سال:
From a software design perspective, access control policies are requirements that must be addressed in a design. For example, access control policies are constraints that determine the type of access authorized users have on information resources. In this paper, we show how one can formulate access control policies as a policy model, formulate an access control aspect model that enforces polici...
Vehicle identification plays important role in Intelligent Transportation System. Vehicle is identified uniquely by its number plate. It is used for applications like identification of authorized vehicles, providing controlled access to restricted areas, and law enforcement. In the proposed system the license number of the car is checked against the database of authorized users and only authori...
Setting up a marine reserve involves access monitoring, with the goal of avoiding intrusions of not authorized boats – also considering that, typically, marine reserves are located in areas not easily accessible. Nowadays, intrusion detection in marine reserves is carried out by using radar systems or suitable cameras activated by movement sensors. In this paper, we present a multiagent system ...
At present methods for providing conditional access to restricted resources and applications for permitting personnel, such as military members, government agencies, or first-responders are not available. The conditional access is provided if the user is an authentic user in one of the authorized geographic location and is connected to specific base transceiver stations or base station controll...
How should a distributed file system manage access to protected content? On one hand, distributed storage should make data access pervasive: authorized users should be able to access their data from any location. On the other hand, content protection is designed to restrict access— this is often accomplished by limiting the set of computers from which content can be accessed. In this paper, we ...
Currently, the World Wide Web is mostly composed of isolated and loosely connected "data islands". Connecting them together and retrieving only the information that is of interest to the user is the common Web usage process. Creating infrastructure that would support automation of that process by aggregating and integrating Web data in accordance to user’s personal preferences would greatly imp...
Abstract. The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanis...
as: Chatt sity – Co Abstract Wireless body area networks (WBANs) can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes ...
Archipelago is system analysis and visualization tool which implements several methods of automated resource and security analysis for humancomputer networks; this includes physical networks, social networks, knowledge networks and networks of clues in a forensic analysis. Access control, intrusions and social engineering can be discussed in the framework of graphical and information theoretica...
The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are req...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید