The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Authorization is an important means to endow the access requestors with different access rights according to their identities. In trust management and access control systems, authorization is used to ensure that legitimate users can access the required resources or accomplish the valid operations towards some resources. However, unlimited authorization transfer may lead to conflicts in access right...
Virtual enterprise is a temporary alliance of enterprises that come together to share skills, core competencies or resources. The members in virtual enterprise need to collaborate in a distributed, dynamic, open and heterogeneous environment. Traditional Access control mechanisms, which serve the single enterprises, are not suitable for virtual enterprise. By incorporating task delegation, trust management...
OS compromise is one of the most serious computer security problems today, but still not being resolved. Although people proposed different kinds of methods, they could not be accepted by most users who are non-expert due to the lack of compatibility and usability. In this paper, we introduce a kind of new mandatory access control model, named CUMAC, that aims to achieve good-enough security, high...
WiMAX security has two goals, one is to provide privacy across the wireless network and the other is to provide access control to the network. Privacy is accomplished by encrypting connections between the subscriber station and the base station. The base station protects against unauthorized access by enforcing encryption of service flows across the network. This paper analyzes the physical layer...
This paper consists of a survey of various e-business, e-marketplaces, graphics and imaging processing, pattern recognition, computer vision, access control, authentication, authorization, etc. applications based on the intelligent computing, and also a summary of the recent techniques such as still artificial neural networks, swarm intelligence, artificial immune systems, fractal geometry, artificial...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.