Results 11 to 20 of about 305,823 (288)
Permission delegation in access control provides the subject with a second method to obtain object permissions in addition to permission granting. It is especially applicable when the owner and manager of the object are inconsistent. With the development
Jinshan Shi, Ru Li, Wenhan Hou
doaj +3 more sources
Container Image Access Control Architecture to Protect Applications
A container platform allows various applications to be deployed or run after installation. A user can download or execute a container image with the required application.
Sung-Hwa Han +4 more
doaj +1 more source
Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues.
Sloan, Robert, Warner, Richard
openaire +4 more sources
It is established that the security of information and telecommunication systems depends significantly on the high level of efficiency of the access control and data protection systems.
O.S. Boichenko +3 more
doaj +1 more source
HEALTH INFORMATION TECHNOLOGY IN EXCHANGE OF HEALTH INFORMATION [PDF]
Health information technology involves the exchange of health information in an electronic environment. Data protection is comprised of many elements, including where the data resides, how it is used, and who has access to it.
Jordan Deliversky
doaj +1 more source
A Survey of Access Control Models in Wireless Sensor Networks [PDF]
Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor ...
Christianson, B. +3 more
core +2 more sources
The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of the research is to consider the main methods and algorithms for identifying an individual by ...
Vasyl Trysnyuk +4 more
doaj +1 more source
Preventing unauthorized access in information centric networking [PDF]
The increasing traffic volume and new requirements of highly scalable and efficient distribution of contents exceed the capabilities of the current Internet architecture. Information centric networking (ICN) is a new communication paradigm for the next generation internet (NGI), which focuses mainly on contents.
Eslam G. AbdAllah +2 more
openaire +1 more source
HEALTH RECORDS AND INFORMATION TECHNOLOGY IN SUPPORT OF EXCHANGE OF HEALTH INFORMATION [PDF]
The exchange of health information in conditions directly related to electronic environment is referred as health information technology. Usually the protection of personal health related data is comprised of various elements such as ways of information ...
Jordan Deliversky
doaj +1 more source
Unauthorized Access Detection in Underlay Cognitive Satellite Networks
This letter proposes a higher order moments-based spectrum sensing method for detecting unauthorized accesses in underlay cognitive satellite communication networks. Exploiting the second, fourth and sixth-order moments of the received signal, an estimate of the hidden signal power is evaluated.
Francesco Benedetto +2 more
openaire +3 more sources

