Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "access control" wg kryterium: Wszystkie pola


Wyświetlanie 1-4 z 4
Tytuł:
Towards an Auditable Cryptographic Access Control to High-value Sensitive Data
Autorzy:
Kanciak, Krzysztof
Wrona, Konrad
Powiązania:
https://bibliotekanauki.pl/articles/227097.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
identity-based encryption
GDPR
Opis:
We discuss the challenge of achieving an auditable key management for cryptographic access control to high-value sensitive data. In such settings it is important to be able to audit the key management process - and in particular to be able to provide verifiable proofs of key generation. The auditable key management has several possible use cases in both civilian and military world. In particular, the new regulations for protection of sensitive personal data, such as GDPR, introduce strict requirements for handling of personal data and apply a very restrictive definition of what can be considered a personal data. Cryptographic access control for personal data has a potential to become extremely important for preserving industrial ability to innovate, while protecting subject’s privacy, especially in the context of widely deployed modern monitoring, tracking and profiling capabilities, that are used by both governmental institutions and high-tech companies. However, in general, an encrypted data is still considered as personal under GDPR and therefore cannot be, e.g., stored or processed in a public cloud or distributed ledger. In our work we propose an identity-based cryptographic framework that ensures confidentiality, availability, integrity of data while potentially remaining compliant with the GDPR framework.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 3; 449-458
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Modeling and design of role engineering in development of access control for dynamic information systems
Autorzy:
Poniszewska-Marańda, A.
Powiązania:
https://bibliotekanauki.pl/articles/200307.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
access control of information systems
access control models
role engineering
usage control
Opis:
Nowadays, the growth and complexity of functionalities of current information systems, especially dynamic, distributed and heterogeneous information systems, makes the design and creation of such systems a difficult task and at the same time, strategic for businesses. A very important stage of data protection in an information system is the creation of a high level model, independent of the software, satisfying the needs of system protection and security. The process of role engineering, i.e. the identification of roles and setting up in an organization is a complex task. The paper presents the modeling and design stages in the process of role engineering in the aspect of security schema development for information systems, in particular for dynamic, distributed information systems, based on the role concept and the usage concept. Such a schema is created first of all during the design phase of a system. Two actors should cooperate with each other in this creation process, the application developer and the security administrator, to determine the minimal set of user’s roles in agreement with the security constraints that guarantee the global security coherence of the system.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2013, 61, 3; 569-579
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance Evaluation of a Helper Initiated Distributed Cooperative Medium Access Control Protocol for Wireless Networks
Autorzy:
Amin, Md. Ruhul
Hossain, Md. Shohrab
Powiązania:
https://bibliotekanauki.pl/articles/227238.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
RTS
CTS
cooperative networking
IEEE 802.11 DCF MAC
BEB
Opis:
Cross layer cooperative protocol which exploits the benefits of physical layer cooperative communication, is one of the widely recognized MAC layer protocol design strategies for future wireless networks. This paper presents performance analysis of a cooperative mac and these performance parameters are compared those of the legacy IEEE 802.11 DCF MAC. Appropriate relay station selection is the main hurdle in designing efficient cooperative MAC protocol for wireless networks. This cooperative mac demonstrated that intermediate relay nodes themselves can initiate cooperation for relaying data frame to the receiver on behalf of the sender. This procedure makes the selection process of a “helper node” more distributed in nature as well as it contributes to increase throughput of a wireless network by reducing the overheads that are usually incurred in the helper selection process. It has been shown by thorough analytical analysis that the proposed cooperative MAC protocol offers higher throughput and lower frame transmission delay in both ideal and error prone wireless environment. These performance metrics are also evaluated while the wireless nodes are mobile as well.
Źródło:
International Journal of Electronics and Telecommunications; 2019, 65, 3; 421-428
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Rational taxation in an open access fishery model
Autorzy:
Rokhlin, D. B.
Usov, A.
Powiązania:
https://bibliotekanauki.pl/articles/229509.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
marginal value function
stimulating taxes
myopic agents
optimal control
Opis:
We consider a model of fishery management, where n agents exploit a single population with strictly concave continuously differentiable growth function of Verhulst type. If the agent actions are coordinated and directed towards the maximization of the discounted cooperative revenue, then the biomass stabilizes at the level, defined by the well known “golden rule”. We show that for independent myopic harvesting agents such optimal (or ε-optimal) cooperative behavior can be stimulated by the proportional tax, depending on the resource stock, and equal to the marginal value function of the cooperative problem. To implement this taxation scheme we prove that the mentioned value function is strictly concave and continuously differentiable, although the instantaneous individual revenues may be neither concave nor differentiable.
Źródło:
Archives of Control Sciences; 2017, 27, 1; 5-27
1230-2384
Pojawia się w:
Archives of Control Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-4 z 4

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies