Results 1 to 10 of about 13,471 (161)

A novel smart multilevel security approach for secure data outsourcing in crisis [PDF]

open access: yesPeerJ Computer Science, 2023
The Interconnected Network or the Internet has revolutionized digital communications. It has expanded worldwide over the past four decades due to numerous features such as connectivity, transparency, hierarchy, and openness.
Akram Y. Sarhan
doaj   +3 more sources

Multilevel Database Security for Android Using Fast Encryption Methods [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2022
Multilevel Security (MLS) is one of the ways that protects the stored information in the computer and mobile devices. It classifies users and information into levels of security; thus, the user can access information within its level or less.
Najla AI Dabagh, Mahmood S. Mahmood
doaj   +1 more source

COORDINATION IN MULTILEVEL NETWORK-CENTRIC CONTROL SYSTEMS OF REGIONAL SECURITY: APPROACH AND FORMAL MODEL [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2015
The paper deals with development of methods and tools for mathematical and computer modeling of the multilevel network-centric control systems of regional security. This research is carried out under development strategy implementation of the Arctic zone
A. V. Masloboev   +2 more
doaj   +1 more source

Multilevel secure access control policy for distributed systems

open access: yes网络与信息安全学报, 2017
A multilevel secure access control strategy for distributed system was proposed,which could guarantee the data confidentiality and security,through adding platform and middleware modules.The security policy was described in the XACML language,and the ...
Ming-xin MA   +2 more
doaj   +3 more sources

Views for Multilevel Database Security [PDF]

open access: yesIEEE Transactions on Software Engineering, 1987
Because views on relational database systems mathematically define arbitrary sets of stored and derived data, they have been proposed as a way of handling context-and content-dependent classification, dynamic classification, inference, aggregation, and sanitization in multilevel database systems.
D.E. Denning   +6 more
openaire   +2 more sources

The roots of armed conflicts: Multilevel security perspective

open access: yesSecurity and Defence Quarterly, 2020
The aim of this study is to indicate the roots of armed conflicts based on an analysis of a variety of theoretical approaches. The methodological framework for this research is Kenneth Waltz’s concept of analytical levels’ causes of armed conflicts: (1 ...
Marzena Żakowska
doaj   +1 more source

Financial Security Risk Detection in Colleges and Universities Relying on Big Data Clustering Center Scheduling Algorithm

open access: yesAdvances in Multimedia, 2022
In order to improve the monitoring effect of financial security risk in colleges and universities, this paper studies the financial security risk control of colleges and universities combined with the big data clustering center scheduling algorithm and ...
Chengjuan Xia
doaj   +1 more source

Physical-Layer Security Improvement in MIMO OFDM Systems Using Multilevel Chaotic Encryption

open access: yesIEEE Access, 2023
Ensuring physical-layer security (PLS) in wireless communication has always been a challenge due to the broadcasting nature of the transmission. In this work, a multilevel chaotic encryption (MCE) system is proposed to improve PLS in Multiple-Input ...
Mohammad Mahmudul Hasan   +2 more
doaj   +1 more source

Multimedia Multilevel Security by Integrating Steganography and Cryptography Techniques [PDF]

open access: yesITM Web of Conferences, 2023
Multimedia-based Steganography is famous for its security purpose, These steganography techniques were used by our ancestors and it is still carried out now with better and vast technology. The aim is to provide better security in an effective and secure
Satish E.G.   +4 more
doaj   +1 more source

Analysis of three multilevel security architectures [PDF]

open access: yesProceedings of the 2007 ACM workshop on Computer security architecture, 2007
Various system architectures have been proposed for high assurance enforcement of multilevel security. This paper provides an analysis of the relative merits of three architectural types -- one based on a security kernel, another based on a traditional separation kernel, and a third based on a least-privilege separation kernel.
Levin, Timothy E.   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy