Zobrazeno 1 - 10
of 203
pro vyhledávání: '"Privilege Management Infrastructure"'
Publikováno v:
IEEE Transactions on Fuzzy Systems. 29:137-147
The vehicular ad hoc network (VANET) is a type of mobile wireless networks, where vehicles are allowed to broadcast a message to its neighbors and access data from other participants. However, how to guarantee the reliability of these broadcast messa
Autor:
Philippe Lacour, Aurélien Bénel
Publikováno v:
Journal of Data Mining and Digital Humanities
Journal of Data Mining and Digital Humanities, Episciences.org, 2021, Atelier Digit_Hum, ⟨10.46298/jdmdh.6733⟩
Journal of Data Mining and Digital Humanities, 2021, Numéro spécial sur les humanités numériques, Atelier Digit_Hum, ⟨10.46298/jdmdh.6733⟩
Journal of Data Mining and Digital Humanities, Episciences.org, In press
Journal of Data Mining and Digital Humanities, Vol Atelier Digit_Hum, Iss Digital humanities in languages (2021)
Journal of Data Mining and Digital Humanities, Episciences.org, 2021, Atelier Digit_Hum, ⟨10.46298/jdmdh.6733⟩
Journal of Data Mining and Digital Humanities, 2021, Numéro spécial sur les humanités numériques, Atelier Digit_Hum, ⟨10.46298/jdmdh.6733⟩
Journal of Data Mining and Digital Humanities, Episciences.org, In press
Journal of Data Mining and Digital Humanities, Vol Atelier Digit_Hum, Iss Digital humanities in languages (2021)
TraduXio is a digital environment for computer assisted multilingual translation which is web-based, free to use and with an open source code. Its originality is threefold-whereas traditional technologies are limited to two languages (source/target),
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::737cd343242529eb841ba58353b346d6
https://hal.archives-ouvertes.fr/hal-02920044
https://hal.archives-ouvertes.fr/hal-02920044
Publikováno v:
2020 Chinese Automation Congress (CAC).
The computer room management system is a management system for network monitoring, bottom control, information filtering and security monitoring of computer room. It has the characteristics of multi-user and multi module. Scientific and intelligent m
Autor:
Ma Wanli, Dang Xiaoyan, Li Yang, Qi Zhang, Jian Wu, Chao Han, Ma Junwei, Xue Honglin, Jianliang Zhang, Zhao Min
Publikováno v:
CSAE
Data sharing and exchange is an effective way to release the vitality and value of data resources, but it also brings security problems, especially in the distributed environment. In this paper, a data sharing scheme based on blockchain, smart contra
Autor:
Ahmed F. Sheikh
Publikováno v:
CompTIA Security+ Certification Study Guide ISBN: 9781484262337
In this chapter you will learn about fundamental concepts along with best practices of authorization and access control. You will also gain an understanding of how to apply the correct security controls when managing accounts.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::044483400c5f79d8e77934782b3ea6fb
https://doi.org/10.1007/978-1-4842-6234-4_14
https://doi.org/10.1007/978-1-4842-6234-4_14
Publikováno v:
Information Sciences. 444:36-50
Rooting an Android device can be a voluntary behavior from end users with various motivations, such as removing OEM pre-installed apps. This leads to an increase in opportunity of privilege escalation for malwares. The existing root privilege managem
Publikováno v:
Journal of Network and Computer Applications. 107:69-82
As a critical part in mobile cloud computing, the vulnerability of Android devices can directly affect the security of the mobile cloud. The unsecured Android can be potentially exploited by malwares to obtain the root privilege. Root privilege misus
Publikováno v:
Computers & Security. 69:50-64
Public key encryption with keyword search (PEKS) provides the functionality of encrypted data retrieval with keyword privacy in database systems. PEKS allows a user to specify a keyword and search the encrypted data associated with this keyword that
Publikováno v:
2019 IEEE 5th International Conference on Computer and Communications (ICCC).
Either RBAC or ABAC has its own advance and shortage in large enterprise applications, thus there is a need for a hybrid access control model which combines the merits of both models. By weighing the advantages and disadvantages of both models, this
Autor:
Jia Wenjie, He Zhihong
Publikováno v:
2019 International Conference on Smart Grid and Electrical Automation (ICSGEA).
Contraposing to the security of cloud storage service network and data sharing characteristics, a ciphertext access control mechanism based on CP-ABE algorithm is proposed. The access control mechanism is studied from two aspects: access control and