Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Analyzing similarity of access control policies is very important in many application sceneries, for example, conducting similarity analysis to reduce policy scale in cloud services composition, or through similar policies to find cloud services which have same function. Existing methods of policy similarity analysis are mainly based on logical reasoning or Boolean function comparison, which are computationally...
Digital evidences are the important basis in digital forensic. This paper proposed a concrete digital evidence protection method with hierarchical access control mechanisms using cryptographic techniques. It allows judicial policeman to authenticated encrypt the collected digital evidences from being disclosed and modified by potential malicious attackers (including malicious insiders and outsiders)...
Distributed GIS system's data security, especially access control, has become an indispensable function component in the practical application of distributed system. However, current approaches to access control are mostly based on individual user identity; hence they do not scale to distributed systems. In this paper, a new access control mechanism which is the combination of trust and role-based...
In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be...
The access control service has been an important orientation in the security research. In this paper, the essentiality of access control service in the E-Commerce Web was analyzed; the relative technologies were introduced at the same time. And through describing a concrete collaborative e-commerce platform, a detailed description of how to design and implementation of access control systems were...
Recently, a new class of crime scenes has become more prevalent. In a variety of criminal activities technologies are used to maintain records, communication, and commit crimes. For this reason, the challenge to investigative professionals is how to retrieve the digital evidence from storage devices and how to take the suspect to court. Digital evidence is different from physical. When the investigative...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.