27   Artículos

 
en línea
Shengyang Li, Zhen Wang and Wanfeng Zhang    
Cloud computing has become one of the key technologies used for big data processing and analytics. User management on cloud platforms is a growing challenge as the number of users and the complexity of systems increase. In light of the user-management sy... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota    
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jie Tang, Bin Zhang and Umair Akram    
Personal information has been likened to ?golden data?, which companies have chased using every means possible. Via mobile apps, the incidents of compulsory authorization and excessive data collection have evoked privacy concerns and strong repercussions... ver más
Revista: Information    Formato: Electrónico

 
en línea
Amna Batool, Seng W. Loke, Niroshinie Fernando and Jonathan Kua    
This paper proposes a policy management framework which we call the SANIJO framework. This framework comprises three different types of policy rules that are applicable to smart devices for managing their multiuser?multidevice interactions in IoT collect... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Sara Monaliza Sousa Nogueira, Marco Aurélio dos Santos, Sandro Alberto Vianna Lordelo, José Rodrigues de Farias Filho     Pág. e47064
The Brazilian fish farming in Federal reservoirs is being discouraged by the country's current legal system due to the bureaucracy and the involvement of many agencies. This research provides a survey of the problems related to the current processes of A... ver más
Revista: Acta Scientiarum: Technology    Formato: Electrónico

 
en línea
Gabriel Nyame and Zhiguang Qin    
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations. As a socio-technical concept, the notion of role in RBAC has been overemphasized, while very little a... ver más
Revista: Information    Formato: Electrónico

 
en línea
Wei Sun, Hui Su and Huacheng Xie    
Recently, attribute-based access control (ABAC) has received increasingly more attention and has emerged as the desired access control mechanism for many organizations because of its flexibility and scalability for authorization management, as well as it... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
L Raghavendar Raju,C R K Reddy     Pág. pp. 40 - 51
 Identifying trusted nodes for safe communication is a key challenge in mobile ad-hoc networks. Node compromises a service and leads to uncertainty in node behaviour. Computing the node trust and node management will enhance the security aspect... ver más

 
en línea
Wei Sun, Hui Su and Hongbing Liu    
Role-based access control (RBAC) is one of the most popular access-control mechanisms because of its convenience for management and various security policies, such as cardinality constraints, mutually exclusive constraints, and user-capability constraint... ver más
Revista: Information    Formato: Electrónico

 
en línea
Febdwi Suryani     Pág. 83 - 94
This study aims to analyze the internal control system and procedures of lending activities in UEDSP Desa Tanah Merah Kecamatan Siak Hulu Kabupaten Kampar. Internal control of lending activities to an organizations is one important aspect. Data resources... ver más
Revista: Journal of Economic; Bussines and Accounting (COSTING)    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »