• No results found

authorized users

Identifying the Authorized Users in the Network with a New Methodology

Identifying the Authorized Users in the Network with a New Methodology

... ABSTRACT: Authentication is very important to identify the user in the network. To identify whether the system is used by a human or not we use the CAPTCHA.CAPTCHA is an acronym for co[r] ...

7

Secure Fuzzy Multi-Keyword Ranked Search over Encrypted Cloud Data

Secure Fuzzy Multi-Keyword Ranked Search over Encrypted Cloud Data

... cloud servers cannot be completely trusted to protect data, the files must be encrypted before outsourcing. The cloud server will provide keyword retrieval service to authorized users. There is a predefined ...

7

Data Confidentiality in Secure and Distributed Data Discovery and Dissemination Protocols in WSNs

Data Confidentiality in Secure and Distributed Data Discovery and Dissemination Protocols in WSNs

... 1) The need of distributed data discovery and dissemination protocols is not completely new, but previous work did not address this need. We study the functional requirements of such protocols, and set their design ...

6

A Smart Crypto Scheme for Multi Owner Data          Authentication over Cloud Service

A Smart Crypto Scheme for Multi Owner Data Authentication over Cloud Service

... to authorized users, such that a user can only decrypt a ciphertext if and only if the data file attributes satisfy the access ...to authorized users, such that a user can only decrypt a ...

5

Abstract One of the catchwords in the Information Technology is Internet of Things (IoT), wherein

Abstract One of the catchwords in the Information Technology is Internet of Things (IoT), wherein

... It is the ability to allow authorized users to access sensitive and protected data. There are many security mechanisms to provide data confidentiality- Data Encryption: a way in which the data can be ...

9

chengpengli.pdf

chengpengli.pdf

... by users is: finding detailed information about fitness group classes, leaving comments and reviewing ...For authorized users, they can edit and update the class ...

36

Web based controlling system for computer technology laboratory

Web based controlling system for computer technology laboratory

... needs users’ authentication before they can browse to view or monitor laboratory appliances through the web and control them as they ...purposes, authorized users are required to create user name and ...

8

An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing

An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing

... malicious users to gain unauthorized access to sensitive ...and authorized users’ keys which are assigned to individual users based on access control ...

11

A Protected Multi Authorizing Reprogramming Protocol for Wireless Sensor Networks

A Protected Multi Authorizing Reprogramming Protocol for Wireless Sensor Networks

... allows authorized users to reprogram sensor nodes in a distributed manner and also classify the sensor nodes before sending the code image to the sensor ...

6

A CLOUD NETWORK-BASED POWER MANAGEMENT TECHNOLOGY FOR SMART HOME SYSTEMS

A CLOUD NETWORK-BASED POWER MANAGEMENT TECHNOLOGY FOR SMART HOME SYSTEMS

... structure, authorized users or system managers can log into the web server which is connected with the database, monitoring the power status and take actions on the appliances ...

8

Vol 3, No 12 (2015)

Vol 3, No 12 (2015)

... Clouds can provide many types of services like applications and platforms to help developers write applications (e.g., Amazon’s S3, Windows Azure).The data stored in clouds is highly sensitive, for example, medical ...

5

Advanced Re-Encryption Technique And Verification Process In Cloud Computing

Advanced Re-Encryption Technique And Verification Process In Cloud Computing

... revoked users tries to attack the file then the data owner should get the data from the cloud server and private communication channels[1] must be established to distribute the new keys to the users and ...

5

A Study on the Impact of Ethical Behaviour of Firms on Global Competitiveness Ranking

A Study on the Impact of Ethical Behaviour of Firms on Global Competitiveness Ranking

... only authorized users can access the ...cloud. Users are given sets of attributes and corresponding ...the users have matching set of attributes, can they decrypt the information stored in the ...

5

ANONYMOUS AUTHENTICATION TO CLOUD DATA STORAGE USING DECENTRALIZED ACCESS AND LOGGING SYSTEM

ANONYMOUS AUTHENTICATION TO CLOUD DATA STORAGE USING DECENTRALIZED ACCESS AND LOGGING SYSTEM

... only authorized users can access the ...that users should not be able to know her identity, but must trust that the information is from a valid ...

11

AN ALAYSIS OF MACHINE LEARNING PREDICTION ALGORITHM TO DETERMINE BEST PERFORMING ROUTES IN COGNITIVE RADIO NETWORKS

AN ALAYSIS OF MACHINE LEARNING PREDICTION ALGORITHM TO DETERMINE BEST PERFORMING ROUTES IN COGNITIVE RADIO NETWORKS

... the authorized users (additionally named primary users, PUs) are not continually utilizing their spectrum bands; CR brings new radio sorts cognitiveradios that ought to the right off the bat, ...

7

Secured Group Data Sharing Over Cloud by Using Aggregate Key and Searchable Encryption Techniques

Secured Group Data Sharing Over Cloud by Using Aggregate Key and Searchable Encryption Techniques

... of authorized users, and each user who has the access right can provide a trapdoor to perform the keyword search over the shared ...all users who can access it, and broadcast encryption is used to ...

5

Survey on Phrase Search Scheme over Encrypted Data on Cloud Systems

Survey on Phrase Search Scheme over Encrypted Data on Cloud Systems

... Storing and retrieving such a large amount of data consumes lot of time as data in the cloud needs to be always stored in encrypted format while storing and needs to be decrypted while searching. There are a number of ...

6

Performance Analysis of Different Security Based Protocols for Wireless Sensor Network

Performance Analysis of Different Security Based Protocols for Wireless Sensor Network

... and users will be shared by applications from multiple ...and users with various benefits will be a critical issue, for which effective solutions are as yet ...

9

Attribute based Encryption and Symmetric Key Distribution for Secure Storage in Clouds

Attribute based Encryption and Symmetric Key Distribution for Secure Storage in Clouds

... Users receive a token from the trustee, who is assumed to be honest. A trustee can be someone like the federal government who manages social insurance numbers etc. On presenting her id to the trustee, trustee ...

5

Efficient and Secure Scheme for Distributed Data          Storage Systems

Efficient and Secure Scheme for Distributed Data Storage Systems

... that users make on such data as the use of external storage and data processing services for storing and managing sensitive data is becoming more and more ...

5

Show all 10000 documents...

Related subjects