To see the other types of publications on this topic, follow the link: Authorised user.

Journal articles on the topic 'Authorised user'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Authorised user.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

SAFAVI-NAINI, REIHANEH, HUAXIONG WANG, and DUNCAN S. WONG. "RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES." International Journal of Foundations of Computer Science 17, no. 05 (2006): 1205–21. http://dx.doi.org/10.1142/s0129054106004340.

Full text
Abstract:
Multicasting has become the main mode communication for providing a wide range of Internet services such as video broadcasting and multi-party teleconferencing, where data must be delivered to multiple recipients. The main focus of the work on securing multicast applications has been to control access and to ensure that only authorised users can access the broadcast. The authorised group is not fixed and may change over time and hence efficient methods of re-keying are of very important. Logical Key Hierarchy (LKH) schemes are schemes that use a logical tree to assign keys to users: each user
APA, Harvard, Vancouver, ISO, and other styles
2

Anwer, Mardin A., Ingo Stengel, and Rina Dinkha Zarro. "User-centered Security for Protecting Patient Privacy for E-health Cloud Computing." Journal of University of Human Development 2, no. 3 (2016): 509. http://dx.doi.org/10.21928/juhd.v2n3y2016.pp509-514.

Full text
Abstract:
E-health is the present communication structure in medicine especially in developed countries. Toward enhancing the quality of care and reduce the health care delivery cost, cloud Computing technology has been adopted. In recent times services such as exchange and share medical data among staff and then to the patients are one the main reasons behind using this technology in e-health. Hence, using cloud computing in e-health has many challenges particularly when dealing with electronic healthcare records (EHR).
 Cloud computing is an agglomeration of technologies, operating systems, stora
APA, Harvard, Vancouver, ISO, and other styles
3

Karapetyan, Daniel, Andrew J. Parkes, Gregory Gutin, and Andrei Gagarin. "Pattern-Based Approach to the Workflow Satisfiability Problem with User-Independent Constraints." Journal of Artificial Intelligence Research 66 (September 5, 2019): 85–122. http://dx.doi.org/10.1613/jair.1.11339.

Full text
Abstract:
The fixed parameter tractable (FPT) approach is a powerful tool in tackling computationally hard problems. In this paper, we link FPT results to classic artificial intelligence (AI) techniques to show how they complement each other. Specifically, we consider the workflow satisfiability problem (WSP) which asks whether there exists an assignment of authorised users to the steps in a workflow specification, subject to certain constraints on the assignment. It was shown by Cohen et al. (JAIR 2014) that WSP restricted to the class of user-independent constraints (UI), covering many practical cases
APA, Harvard, Vancouver, ISO, and other styles
4

Schreuders, Z. Cliffe, Tanya McGill, and Christian Payne. "Towards Usable Application-Oriented Access Controls." International Journal of Information Security and Privacy 6, no. 1 (2012): 57–76. http://dx.doi.org/10.4018/jisp.2012010104.

Full text
Abstract:
A number of security mechanisms are available for improving the security of systems by restricting the actions of individual programs to activities that are authorised. However, configuring these systems to enforce end users’ own security goals is often beyond their expertise. Little research has investigated the usability issues associated with application-oriented access controls. This paper presents the results of a qualitative analysis of user perceptions of the usability of three application-oriented security systems: SELinux, AppArmor, and FBAC-LSM. Qualitative analysis identified a numb
APA, Harvard, Vancouver, ISO, and other styles
5

ALmarwani, Reem, Ning Zhang, and James Garside. "An effective, secure and efficient tagging method for integrity protection of outsourced data in a public cloud storage." PLOS ONE 15, no. 11 (2020): e0241236. http://dx.doi.org/10.1371/journal.pone.0241236.

Full text
Abstract:
Data Integrity Auditing (DIA) is a security service for checking the integrity of data stored in a PCS (Public Cloud Storage), a third-party based storage service. A DIA service is provided by using integrity tags (hereafter referred to tags). This paper proposes a novel tagging method, called Tagging of Outsourced Data (TOD), for generating and verifying tags of files. TOD has a number of unique properties: (i) it supports both public and private verifiability, and achieves this property with a low level of overhead at the user end, making it particularly attractive to mobile users with resou
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Zubaidie, Mishall, Zhongwei Zhang, and Ji Zhang. "RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications." Security and Communication Networks 2019 (March 17, 2019): 1–26. http://dx.doi.org/10.1155/2019/3263902.

Full text
Abstract:
Providing a mechanism to authenticate users in healthcare applications is an essential security requirement to prevent both external and internal attackers from penetrating patients’ identities and revealing their health data. Many schemes have been developed to provide authentication mechanisms to ensure that only legitimate users are authorised to connect, but these schemes still suffer from vulnerable security. Various attacks expose patients’ data for malicious tampering or destruction. Transferring health-related data and information between users and the health centre makes them exposed
APA, Harvard, Vancouver, ISO, and other styles
7

Wen, Yean-Fu, Ko-Yu Hung, Yi-Ting Hwang, and Yeong-Sung Frank Lin. "Sports lottery game prediction system development and evaluation on social networks." Internet Research 26, no. 3 (2016): 758–88. http://dx.doi.org/10.1108/intr-05-2014-0139.

Full text
Abstract:
Purpose – The purpose of this paper is to establish a social-network sp.orts lottery system to support users in predicting and simulating sports lottery betting. The community data were generated to support user decision and featured instant game records and odds data synchronisation. Furthermore, the next development cycle were evaluated through a questionnaire. Design/methodology/approach – An extended prototype website development methodology was applied to develop the system. An online sample was collected to evaluate the function, interface, operation, and prediction designs. The χ2 test
APA, Harvard, Vancouver, ISO, and other styles
8

Tarp, Sven. "Retskrivningsordbog mellem to stole." HERMES - Journal of Language and Communication in Business 26, no. 50 (2017): 127. http://dx.doi.org/10.7146/hjlcb.v26i50.97828.

Full text
Abstract:
In November 2012, the fourth edition of the official Danish orthographic dictionary, Retskrivningsordbogen, was published by the Danish Language Board which, according to national law, is authorised to establish the official Danish orthography and publish its decisions in the form of a dictionary, now available in both a printed and an electronic version. In order to be high quality, a work of this sort requires knowledge of language policy and linguistics, on the one hand, and lexicography, on the other hand. The article analyses the Retskrivningsordbogen exclusively from the point of view of
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Rajendra. "COMPARISON OF CLASSIFICATION ALGORITHMS TO DETECT PHISHING WEB PAGES USING FEATURE SELECTION AND EXTRACTION." International Journal of Research -GRANTHAALAYAH 4, no. 8 (2016): 118–35. http://dx.doi.org/10.29121/granthaalayah.v4.i8.2016.2570.

Full text
Abstract:
The phishing is a kind of e-commerce lure which try to steal the confidential information of the web user by making identical website of legitimate one in which the contents and images almost remains similar to the legitimate website with small changes. Another way of phishing is to make minor changes in the URL or in the domain of the legitimate website. In this paper, a number of anti-phishing toolbars have been discussed and proposed a system model to tackle the phishing attack. The proposed anti-phishing system is based on the development of the Plug-in tool for the web browser. The perfor
APA, Harvard, Vancouver, ISO, and other styles
10

Meng, Xiao Ming, and Jian Hua Zhang. "Research on Dynamic Authorization Access Control Strategy Model of Distributed Multi-Organization MIS." Applied Mechanics and Materials 263-266 (December 2012): 1461–66. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1461.

Full text
Abstract:
Focus on the problem of dynamic authorization access control of Distributed Multi-Organization Management Information System (DMOMIS), the system resources are divided into two kinds: relatively independent resources and shared resources. These two kinds of resources were used different authorization system to authorize. The relatively independent resources were authorized by using distributed authorization system (DA), and the similar and shared resources were authorized by using authorized system (A). According to the key terms definition, the system hypothesis and the idea of dynamic progra
APA, Harvard, Vancouver, ISO, and other styles
11

Hales, Alan Arthur, David Cable, Eleanor Crossley, Callum Findlay, and David Anthony Rew. "Design and implementation of the stacked, synchronised and iconographic timeline-structured electronic patient record in a UK NHS Global Digital Exemplar hospital." BMJ Health & Care Informatics 26, no. 1 (2019): e100025. http://dx.doi.org/10.1136/bmjhci-2019-100025.

Full text
Abstract:
BackgroundConventional electronic screen visualisation formats, which use tabs, dropdown menus, lists and multiple windows, present huge navigation challenges to health professionals. A unifying and intuitive interface for the electronic patient record (EPR) has been an elusive goal for software developers for decades.MethodsSince 2009, by working in an agile way, we have built and implemented a fully operational and dynamic system, the University Hospital Southampton Lifelines (UHSL), within our clinical data estate, in a UK university hospital. UHSL permits the continuously updated display o
APA, Harvard, Vancouver, ISO, and other styles
12

Maucksch, Christof, Peer M. Aries, Silke Zinke, and Ulf Müller-Ladner. "Patient Satisfaction with the Etanercept Biosimilar SB4 Device, Among Rheumatoid Arthritis and Spondyloarthropathy Patients - A German Observational Study." Open Rheumatology Journal 14, no. 1 (2020): 7–14. http://dx.doi.org/10.2174/1874312902014010007.

Full text
Abstract:
Background: The etanercept biosimilar SB4 is a TNF inhibitor authorised for use as a targeted Biological Disease-Modifying Anti-Rheumatic Drug (bDMARD). Various administration devices have been developed for subcutaneous self-injection of bDMARDs. Objective: This study surveyed patient satisfaction with their experience of using the SB4 pre-filled pen device. Methods: This non-interventional, cross-sectional, multi-centre study enrolled adult rheumatoid arthritis and spondyloarthropathy patients who had been treated for at least three months with the SB4 pre-filled pen. Based on a standardized
APA, Harvard, Vancouver, ISO, and other styles
13

Baldwin, Jon A., Asim K. Bag, Sharon L. White, Fathima F. Palot-Manzil, and Janis P. O'Malley. "All You Need to Know as an Authorized User." American Journal of Roentgenology 205, no. 2 (2015): 251–58. http://dx.doi.org/10.2214/ajr.14.13283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Abdul Halim, N. Z., S. A. Sulaiman, K. Talib, and Z. A. Majeed. "INVESTIGATING THE NATIONAL DIGITAL CADASTRAL DATABASE (NDCDB) DATA HANDLING WITHIN GIS APPLICATIONS." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-4/W9 (October 26, 2018): 3–10. http://dx.doi.org/10.5194/isprs-archives-xlii-4-w9-3-2018.

Full text
Abstract:
<p><strong>Abstract.</strong> This paper explains the investigation carried out to understand NDCDB data handling within GIS applications. The method used was a case study replicated to five established GIS applications from different agencies, namely eKadasOnline, SKiP, iPlan, TM SmartMap and DBKL Interactive Portal. The case study was propositioned to the statements of; i) “<i>Such methods of applying NDCDB are because user understands its characteristics</i>”, and ii) “<i>such methods of applying NDCDB are because users know how to adopt it.</i>” Cr
APA, Harvard, Vancouver, ISO, and other styles
15

Freeman, Edward H. "Denial of Service to Authorized Computer Users." Information Systems Security 10, no. 3 (2001): 1–5. http://dx.doi.org/10.1201/1086/43316.10.3.20010701/31723.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Dia, Ousmane Amadou, and Csilla Farkas. "Business Driven User Role Assignment." International Journal of Information Security and Privacy 7, no. 1 (2013): 45–62. http://dx.doi.org/10.4018/jisp.2013010104.

Full text
Abstract:
The authors propose a business-oriented approach to support accurate and dynamic user-role assignments for the Role Based Access Control (RBAC) model. Their model, called Business-Driven Role Based Access Control (BD-RBAC), is composed of three layers. The first layer extends the RBAC model with the concepts of business roles, system roles, credentials, and users’ capabilities. The second layer dynamically assigns users to business and system roles, and filters outdated (abnormal) user-role assignments. The third layer supports exception handling and partial authorization. The novel aspect of
APA, Harvard, Vancouver, ISO, and other styles
17

Bagnoli, Vicente. "Questions that Have Arisen since the EU Decision on the Whatsapp Acquisition by Facebook." Market and Competition Law Review 3, no. 1 (2019): 15–51. http://dx.doi.org/10.7559/mclawreview.2019.314.

Full text
Abstract:
On October 3rd, 2014, the European Commission (EC) concluded the analysis of the transaction by which Facebook, Inc. (“Facebook”, USA) had acquired WhatsApp Inc. (“WhatsApp”, USA) by way of a purchase of shares for US$ 19 billion, which contributed to Facebook’s strategy of focusing its business on mobile development (Case no. COMP/M.7217). In its decision, the EC stated that the deal would raise no competition concerns and authorised the proposed acquisition of WhatsApp by Facebook concluding that Facebook Messenger and WhatsApp are not close competitors and that consumers would continue to h
APA, Harvard, Vancouver, ISO, and other styles
18

Tang, Jie, Bin Zhang, and Umair Akram. "What Drives Authorization in Mobile Applications? A Perspective of Privacy Boundary Management." Information 12, no. 8 (2021): 311. http://dx.doi.org/10.3390/info12080311.

Full text
Abstract:
Personal information has been likened to “golden data”, which companies have chased using every means possible. Via mobile apps, the incidents of compulsory authorization and excessive data collection have evoked privacy concerns and strong repercussions among app users. This manuscript proposes a privacy boundary management model, which elaborates how such users can demarcate and regulate their privacy boundaries. The survey data came from 453 users who authorized certain operations through mobile apps. The partial least squares (PLS) analysis method was used to validate the instrument and th
APA, Harvard, Vancouver, ISO, and other styles
19

T, Subashri, and Vaidehi V. "Effective Voice Calls Admission for Authorized User in Inter VOIP Network." International Journal of Network Security & Its Applications 2, no. 4 (2010): 213–32. http://dx.doi.org/10.5121/ijnsa.2010.2416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Zhu, Xiaohua, and Kristin R. Eschenfelder. "Social Construction of Authorized Users in the Digital Age." College & Research Libraries 71, no. 6 (2010): 548–68. http://dx.doi.org/10.5860/crl-62r1.

Full text
Abstract:
This paper analyzes changes to the definitions of “authorized users” contained in electronic resources licenses and embedded in access control technologies from the mid-1990s to the present. In analyzing changes to the license and technology-based definitions, it tracks shifts in major stakeholders’ perceptions of authorized users and describes developments in licensing and access control technologies. The paper demonstrates that the concept of authorized users has been shaped by a mix of social and technical elements, including changes to information providers’ and libraries’ business models
APA, Harvard, Vancouver, ISO, and other styles
21

Narayana, Vejendla Lakshman, and Divya Midhunchakkaravarthy. "Secured Resource Allocation for Authorized Users Using Time Specific Blockchain Methodology." International Journal of Safety and Security Engineering 11, no. 2 (2021): 201–5. http://dx.doi.org/10.18280/ijsse.110209.

Full text
Abstract:
The utilization of energy in blockchain division is high as resource allocation models are using this technology and the rundown of resource utilization cases is continually developing. The communicated and permanent nature of blockchain innovation might be utilized to quicken the progressing change to increasingly decentralized and digitalized vitality frameworks and to address a portion of the difficulties the business is confronting in providing security in identification of authorized users and resource allocation transactions among the authorized users. The allocated resources to the user
APA, Harvard, Vancouver, ISO, and other styles
22

Ma, Weina, Kamran Sartipi, and Duane Bender. "Knowledge-Driven User Behavior Pattern Discovery for System Security Enhancement." International Journal of Software Engineering and Knowledge Engineering 26, no. 03 (2016): 379–404. http://dx.doi.org/10.1142/s0218194016500169.

Full text
Abstract:
Insider threads posed by authorized users have caused significant security and privacy risks to IT systems. The behavior of authorized users in using system services must be monitored and controlled. However, the administrators in large distributed systems are overwhelmed by the number of system users, the complexity and changing nature of user activities. This paper presents a new generation of intelligent decision support systems that effectively assist system administrators to get deep insight into the system users’ dynamic behavior patterns. With these patterns, the system administrators a
APA, Harvard, Vancouver, ISO, and other styles
23

Tustin, R. Don, Barbara Pennington, and Mitch Byrne. "Intrusiveness of Interventions: Ratings by Psychologists." Behaviour Change 11, no. 2 (1994): 94–100. http://dx.doi.org/10.1017/s0813483900004605.

Full text
Abstract:
A survey was conducted of opinions of 24 psychologists in South Australia about the intrusiveness of 89 interventions including methods that might be used to reduce challenging behaviour. Interventions arose from a variety of sources, including behavioural psychology and medicine. Interventions might infringe on 8 different rights. Respondents rated the degree to which interventions were perceived to intrude on clients' rights, using a 4-point scale: abusive, very intrusive, intrusive, and not intrusive. A reasonable degree of consistency in ratings was found. Respondents did not rate all inte
APA, Harvard, Vancouver, ISO, and other styles
24

Avery, Robert B., Kenneth P. Brevoort, and Glenn B. Canner. "Credit Where None is Due? Authorized User Account Status and 'Piggybacking Credit'." Finance and Economics Discussion Series 2010, no. 23 (2010): 1–30. http://dx.doi.org/10.17016/feds.2010.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Budi P, Ignasius Irawan. "Wireless access point protection from un-authorized user in an office environment." ACMIT Proceedings 1, no. 1 (2019): 90–98. http://dx.doi.org/10.33555/acmit.v1i1.11.

Full text
Abstract:
Extensible Authentication Protocol (EAP) is authentication method to protect wireless local area network from un-authorized user which there was interaction between radius servers, access point and client device. When EAP was used as authentication method, the authentication can be strengthened by using TLS (Transport Layer Security) certificate where client device and server will use certificate to verify the identity of each other. The certificate must meet requirement on the server and client for the successful authentication. For this time, the authentication method provides highest level
APA, Harvard, Vancouver, ISO, and other styles
26

BREVOORT, KENNETH P., ROBERT B. AVERY, and GLENN B. CANNER. "Credit Where None Is Due? Authorized-User Account Status and Piggybacking Credit." Journal of Consumer Affairs 47, no. 3 (2013): 518–47. http://dx.doi.org/10.1111/joca.12020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Belanger, Richard, Christina Grant, Myriam Côté, et al. "CANADIAN PEDIATRICIANS’ VIEWS AND KNOWLEDGE ABOUT CANNABIS USE FOR MEDICAL PURPOSES AMONG CHILDREN AND ADOLESCENTS." Paediatrics & Child Health 23, suppl_1 (2018): e53-e54. http://dx.doi.org/10.1093/pch/pxy054.134.

Full text
Abstract:
Abstract BACKGROUND Cannabis use for medical purposes has gathered growing interest from the public through its purported benefits. Since 2001, Health Canada has authorized availability from health practitioners, even for paediatric patients, despite concerns regarding efficacy and adverse effects among children and adolescents. It is likely that a lack of knowledge regarding the substance and indications for use, tempered by known and unknown side effects, dictate paediatricians’ practice toward cannabis. OBJECTIVES This study examines the views and knowledge of Canadian paediatricians regard
APA, Harvard, Vancouver, ISO, and other styles
28

Wang, Li, Mingshan Xia, and Fazhi Qi. "Security Mechanism for user access to Single SSID WLAN." EPJ Web of Conferences 245 (2020): 07009. http://dx.doi.org/10.1051/epjconf/202024507009.

Full text
Abstract:
Wireless local area network (WLAN) technology is widely used in various enterprises and institutions. In order to facilitate the use of users, they often provide a single SSID access point, resulting in different identities of users authenticated and authorized can connect to the wireless network anytime, anywhere as needed and obtain the same accessible network resources such as bandwidth, access control (ACL) and so on. Multiple SSID can solve the problem but it will be confused to users who don’t know which SSID can be connected. Although we could prevent visitors from accessing intranet re
APA, Harvard, Vancouver, ISO, and other styles
29

Feuereisel, J. "Game appreciation in legislative conditions of the Czech Republic." Journal of Forest Science 49, No. 12 (2012): 575–79. http://dx.doi.org/10.17221/4726-jfs.

Full text
Abstract:
An analysis was made of the present situation concerning game appreciation in the Czech Republic. A study was conducted into effective laws and regulations related to the valuation of nature. There is no legally binding directive for game appreciation in the Czech Republic at the present time. A questionnaire method (Contingent Valuation Method – CVM) was used to survey the activities of all 87 authorised experts in game management currently registered in the Czech Republic. It was found out that the game is appreciated as property, which contradicts to its legal status (res nullius)
APA, Harvard, Vancouver, ISO, and other styles
30

Skaik, Samer. "Operational problems and solutions of statutory complex adjudication: stakeholders’ perspectives." International Journal of Law in the Built Environment 9, no. 2 (2017): 162–75. http://dx.doi.org/10.1108/ijlbe-03-2017-0009.

Full text
Abstract:
Purpose Statutory adjudication was introduced into the security of payment (SOP) legislation as a fast-track payment dispute resolution process with an express object to facilitate cash flow within the construction contractual chain. After more than a decade of the operation of the regime in Australia and Singapore, it becomes apparent that there are many operational problems that jeopardise the intended object of the legislation, particularly in adjudicating complex payment disputes. The aim of this paper is to explore views of the industry stakeholders regarding some operational problems of
APA, Harvard, Vancouver, ISO, and other styles
31

Lentza-Rizos, Ch. "Insecticides authorized for use on olive trees and the relationship between their registration and residues in olive oil." Grasas y Aceites 47, no. 6 (1996): 392–96. http://dx.doi.org/10.3989/gya.1996.v47.i6.886.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

P, Selvi Rajendran, and Rajendran L. "Virtual Bulletin Board using Man-Machine Interface (MMI) for Authorized Users." Indian Journal of Science and Technology 12, no. 34 (2019): 1–6. http://dx.doi.org/10.17485/ijst/2019/v12i34/112683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Barnett, Barry J. "The Last Farm Bill?" Journal of Agricultural and Applied Economics 46, no. 3 (2014): 311–19. http://dx.doi.org/10.1017/s1074070800030030.

Full text
Abstract:
“Farm bill” is a colloquial term for omnibus legislation that authorizes various government programs related to agriculture, food, and rural areas. Some of these programs have their roots in New Deal legislation. Others were initially authorized after the New Deal and subsequently included in farm bills. Some debate exists about exactly which omnibus legislation was the precursor of modern-day farm bills. However, since at least 1973, farm bills have included titles related to farm programs, trade, rural development, farm credit, conservation, agricultural research, food and nutrition programs
APA, Harvard, Vancouver, ISO, and other styles
34

Megha Satyanarayana. "FDA authorizes COVID-19 diagnostic that uses immune cells." C&EN Global Enterprise 99, no. 9 (2021): 11. http://dx.doi.org/10.1021/cen-09909-buscon3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Besmer, Andrew R., Jason Watson, and M. Shane Banks. "Investigating User Perceptions of Mobile App Privacy." International Journal of Information Security and Privacy 14, no. 4 (2020): 74–91. http://dx.doi.org/10.4018/ijisp.2020100105.

Full text
Abstract:
Mobile devices and third-party applications are used by over 4.5 billion people worldwide. Third-party applications often request or even require authorized access to personal information through mobile device components. Application developers explain the need for access in their privacy policies, yet many users are concerned about the privacy implications of allowing access to their personal information. This article explores how user perceptions of privacy affect user sentiment by analyzing over five million user-submitted text reviews and star ratings collected over a four-year period. The
APA, Harvard, Vancouver, ISO, and other styles
36

Olivia, Grace. "ANALYSIS OF CONSUMER PURCHASE BEHAVIOR OF NON-AUTHORIZED (NON BPOM) FACE MASK IN INDONESIA LOCAL PRODUCT." Advanced International Journal of Business, Entrepreneurship and SMEs 3, no. 9 (2021): 67–90. http://dx.doi.org/10.35631/aijbes.39006.

Full text
Abstract:
The face mask trend has developed as a new trend in the Indonesian cosmetics industry lately. Due to the high demand for face masks, Indonesian mask manufacturers are innovating to create local face masks. Unfortunately, several non-authorized local face mask products have been traded on the market with a fairly high level of sales. This study aims to determine consumer awareness of the safety of non-authorized local face masks, and also the relationship between non-authorized local face mask factors. The data were collected by semi-structured interviews and online survey methods towards non-a
APA, Harvard, Vancouver, ISO, and other styles
37

Bassenyemukasa, Charles S., and Randolph J. Pilc. "Using voice signal analysis to identify authorized users of a telephone system." Journal of the Acoustical Society of America 102, no. 6 (1997): 3253. http://dx.doi.org/10.1121/1.420249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Bose, Chandan. "Identifying ‘authorized users’, identifying kin: negotiating relational worlds through Geographical Indications registration." Contemporary South Asia 29, no. 1 (2021): 97–110. http://dx.doi.org/10.1080/09584935.2021.1884656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Mokrosińska, Dorota. "Tajna polityka – próba uzasadnienia." Civitas. Studia z filozofii polityki 20 (June 30, 2017): 141–60. http://dx.doi.org/10.35757/civ.2017.20.07.

Full text
Abstract:
The author raises the question of whether secret uses of power by democratic states can form a legitimate exercise of democratic authority. On the face of it, the answer seems negative. First, it is commonplace to think that in a democracy, political decisions are legitimate only if they are authorized by citizens. From this perspective, secret uses of power seem to lack democratic authority because, one argues, people cannot authorize what they are denied knowledge about. Second, the exercise of democratic authority requires that citizens be able to hold officials accountable, and to do that
APA, Harvard, Vancouver, ISO, and other styles
40

Zhu, Jun, Shan Shan Zhu, and Han Sun. "Cooperative Spectrum Sensing Algorithm Based on High Contribution Value of Secondary Users in Cognitive Radio." Applied Mechanics and Materials 556-562 (May 2014): 4536–41. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.4536.

Full text
Abstract:
Due to the rapid development of wireless communication technology and the increasing demand for wireless communication, spectrum resources are increasingly scarce. Cooperative spectrum sensing technology has effectively improve the spectrum efficiency, in order to avoid secondary users (cognitive user) causing interference to the primary user (authorized user), this paper proposes a new cooperative spectrum sensing algorithm, When an primary user occurs, the algorithm for different secondary users assign different contribution value, authorized users can quickly detected. The end of each round
APA, Harvard, Vancouver, ISO, and other styles
41

Zhang, Yue, Hanlin Zhang, Rong Hao, and Jia Yu. "Authorized identity-based public cloud storage auditing scheme with hierarchical structure for large-scale user groups." China Communications 15, no. 11 (2018): 111–21. http://dx.doi.org/10.1109/cc.2018.8543053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Phoju, Rabindra, and Krishna Prasad Bhandari. "Management of Internet Bandwidth Implementing CoovaChilli and Free Radius." Journal of Science and Engineering 8 (November 12, 2020): 56–60. http://dx.doi.org/10.3126/jsce.v8i0.32864.

Full text
Abstract:
With rapid growth in popularity and use of Internet in academic institutions, the institutions are struggling to keep up with the demand. They need capability to effectively control, monitor and optimize the available bandwidth to ensure good service at optimum cost. This paper has described implementation of Coovachilli and free radius for management of internet bandwidth in academic institutions. During this research, freeware tools such as Freeradius and CoovaChilli have been used to manage Internet bandwidth on a per-user basis based on user credentials. The mechanisms have been used to co
APA, Harvard, Vancouver, ISO, and other styles
43

Alharbi, Muhammad H., and Omar H. Alhazmi. "User Authentication Scheme for Internet of Things Using Near-Field Communication." International Journal of Reliability, Quality and Safety Engineering 27, no. 05 (2020): 2040012. http://dx.doi.org/10.1142/s0218539320400124.

Full text
Abstract:
In the Internet of things (IoT), the user authentication process is becoming more critical with the growing number of the services provided by IoT. Securing access to these services by the user authentication process leads to high security to prevent any attack on the IoT network. The approach keeps the private information secured efficiently and ensuring that only authorized users can access this information. The proposed scheme uses only Chaskey hash function and XOR operation. The security analysis proves that it is immune to different types of attacks. Furthermore, the scheme is faster, li
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Xi Yuan, and Miao Liang Zhu. "A Semantic and Trust Based Framework for RBAC User-Role Assignment." Key Engineering Materials 439-440 (June 2010): 178–82. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.178.

Full text
Abstract:
Semantic; Trust Management; RBAC; User-role Assignment Abstract. The application of RBAC in access management of the enterprise services and resources is very widely. With phenomenal growth of information interaction and cooperation between distributed systems, the number of users can be in the hundreds of thousands or millions. This renders manual user-to-role assignment a formidable task. In this paper, we propose a semantic and trust based framework to automatically assign users to roles based on a finite set of assignment rules defined by authorized people in the enterprise. These rules ta
APA, Harvard, Vancouver, ISO, and other styles
45

Thanekar, Sachin Arun, K. Subrahmanyam, and A. B. Bagwan. "Effective Job Execution in Hadoop Over Authorized Deduplicated Data." Webology 17, no. 2 (2020): 430–44. http://dx.doi.org/10.14704/web/v17i2/web17043.

Full text
Abstract:
Existing Hadoop treats every job as an independent job and destroys metadata of preceding jobs. As every job is independent, again and again it has to read data from all Data Nodes. Moreover relationships between specific jobs are also not getting checked. Lack of Specific user identities creation and forming groups, managing user credentials are the weaknesses of HDFS. Due to which overall performance of Hadoop becomes very poor. So there is a need to improve the Hadoop performance by reusing metadata, better space management, better task execution by checking deduplication and securing data
APA, Harvard, Vancouver, ISO, and other styles
46

Li, Jing, Yong Tang, and Wei Cui. "Storage Technology Research on Three Dimensional Flight Track Based on KML and SQL Server." Applied Mechanics and Materials 421 (September 2013): 717–20. http://dx.doi.org/10.4028/www.scientific.net/amm.421.717.

Full text
Abstract:
For the asymmetry of real time flight information among civil aviation departments and between civil aviation and popular users, the users satisfaction reduced. A research on storage of 3D flight track was proposed combining KML and SQL Server. Firstly, SQL server is applied for storage of existing real time flight data and authorized users information. Then, the KML file is written to present dynamic 3D track. Finally, a website was deployed for authorized user to download the flight data. The research was realized and indicated that it increases data sharing between civil aviation sections a
APA, Harvard, Vancouver, ISO, and other styles
47

Rayani, Praveen Kumar, Bharath Bhushan, and Vaishali Ravindra Thakare. "Multi-Layer Token Based Authentication Through Honey Password in Fog Computing." International Journal of Fog Computing 1, no. 1 (2018): 50–62. http://dx.doi.org/10.4018/ijfc.2018010104.

Full text
Abstract:
This article describes how fog computing empowers network resource utilization by providing services to low bandwidth users in cloud environment. Here, authentication mechanisms are used by fog nodes while providing services to end users. In cloud computing there are several types of authentication mechanisms, in which token based authentication takes less time for validating password. The proposed technique uses token based authentication mechanism with honey password. The aim of this article is to focus on multi-layer token based authentication for identifying the authorized user at fog node
APA, Harvard, Vancouver, ISO, and other styles
48

Bellman, Lina, and Peter Öhman. "Authorised property appraisers’ perceptions of commercial property valuation." Journal of Property Investment & Finance 34, no. 3 (2016): 225–48. http://dx.doi.org/10.1108/jpif-08-2015-0061.

Full text
Abstract:
Purpose – The purpose of this paper is to describe and analyze the thought patterns of authorized property appraisers (APAs) when valuing commercial properties, and draw conclusions about their collective thinking in terms of content, complexity, and homogeneity. Design/methodology/approach – A standard set of value-adding factors and bipolar constructs was included in a grid form used for data collection. The repertory grid technique and principal component analysis were used to map and analyze the thought patterns of nearly half of the APAs in Sweden. Findings – Analysis of the mean grid for
APA, Harvard, Vancouver, ISO, and other styles
49

Feilhauer, Thomas, Florian Braun, Katja Faller, et al. "Mobility Choices—An Instrument for Precise Automatized Travel Behavior Detection & Analysis." Sustainability 13, no. 4 (2021): 1912. http://dx.doi.org/10.3390/su13041912.

Full text
Abstract:
Within the Mobility Choices (MC) project we have developed an app that allows users to record their travel behavior and encourages them to try out new means of transportation that may better fit their preferences. Tracks explicitly released by the users are anonymized and can be analyzed by authorized institutions. For recorded tracks, the freely available app automatically determines the segments with their transportation mode; analyzes the track according to the criteria environment, health, costs, and time; and indicates alternative connections that better fit the criteria, which can indivi
APA, Harvard, Vancouver, ISO, and other styles
50

Javed, Yousra, and Mohamed Shehab. "Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions." Proceedings on Privacy Enhancing Technologies 2017, no. 2 (2017): 23–37. http://dx.doi.org/10.1515/popets-2017-0014.

Full text
Abstract:
Abstract Habituation is a key factor behind the lack of attention towards permission authorization dialogs during third party application installation. Various solutions have been proposed to combat the problem of achieving attention switch towards permissions. However, users continue to ignore these dialogs, and authorize dangerous permissions, which leads to security and privacy breaches. We leverage eye-tracking to approach this problem, and propose a mechanism for enforcing user attention towards application permissions before users are able to authorize them. We deactivate the dialog’s de
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!