Computer security encompasses concepts and methods for protecting sensitive resources in computer systems. Computer security starts from the policies that regulate access to …
Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the …
D Dolev, A Yao - IEEE Transactions on information theory, 1983 - ieeexplore.ieee.org
Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against …
Electronic computers have evolved from exiguous experimental enterprises in the 1940s to prolific practical data processing systems in the 1980s. As we have come to rely on these …
This paper introduces “computer viruses” and examines their potential for causing widespread damage to computer systems. Basic theoretical results are presented, and the …
W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers, programmers, system managers, network managers, product marketing personnel, system …
WL Shiau, X Wang, F Zheng - Information & Management, 2023 - Elsevier
Abstract Information technology brings business success opportunities, but also causes potential safety hazards to organizations. In response to the increasing academia and …
J Park, R Sandhu - ACM transactions on information and system security …, 2004 - dl.acm.org
In this paper, we introduce the family of UCONABC models for usage control (UCON), which integrate Authorizations (A), oBligations (B), and Conditions (C). We call these core models …
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access …