Zobrazeno 1 - 10
of 626
pro vyhledávání: '"multilevel security"'
Autor:
Najla AI Dabagh, Mahmood S. Mahmood
Publikováno v:
Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 16, Iss 1, Pp 87-96 (2022)
Multilevel Security (MLS) is one of the ways that protects the stored information in the computer and mobile devices. It classifies users and information into levels of security; thus, the user can access information within its level or less. A smart
Externí odkaz:
https://doaj.org/article/7ba699b8e5344f0784d5e47bda34eb63
Autor:
Akram Y. Sarhan
Publikováno v:
PeerJ Computer Science, Vol 9, p e1367 (2023)
The Interconnected Network or the Internet has revolutionized digital communications. It has expanded worldwide over the past four decades due to numerous features such as connectivity, transparency, hierarchy, and openness. Several drawbacks, includ
Externí odkaz:
https://doaj.org/article/a1cb7b48e1764c168e612c4f8f4aa483
Publikováno v:
International Journal of Intelligent Networks, Vol 3, Iss , Pp 48-57 (2022)
A secure concurrency control algorithms must be devoid of covert channels originating from data conflicts between transactions, in addition to ensuring database integrity. Current secure concurrency control algorithms mistreat transactions with highe
Externí odkaz:
https://doaj.org/article/1c2b72aaa7f04ebea088ed495d528737
Publikováno v:
网络与信息安全学报, Vol 3, Pp 28-34 (2017)
A multilevel secure access control strategy for distributed system was proposed,which could guarantee the data confidentiality and security,through adding platform and middleware modules.The security policy was described in the XACML language,and the
Externí odkaz:
https://doaj.org/article/584ad9a7731749a089b911cd1565c9aa
Publikováno v:
IEEE Transactions on Reliability. 70:1232-1241
The Bell–LaPadula (BLP) model is a widely used access control model for the multilevel security system. The researchers proposed many modified BLP models to express privileges that cannot be expressed by the BLP model. However, these models are not
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Thomas F. La Porta, Stefan Achleitner, Patrick McDaniel, Trent Jaeger, Srikanth V. Krishnamurthy, Quinn K. Burke
Publikováno v:
IEEE Transactions on Network and Service Management. 18:729-744
Ensuring that information flowing through a network is secure from manipulation and eavesdropping by unauthorized parties is an important task for network administrators. Many cyber attacks rely on a lack of network-level information flow controls to
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 39:3799-3808
Hardware accelerators are increasingly employed in conjunction with general-purpose processors to meet stringent performance constraints. In these heterogeneous systems, security has become a prime concern. In this article, we present a design approa
Publikováno v:
Future Generation Computer Systems. 109:521-530
© 2018 Elsevier B.V. As we progress in into a digital era where most aspects of our life depend upon a network of computers, it is essential to focus on digital security. Each component of a network, be it a physical network, virtual network or soci