Identification, Authentication, and Access Control
In: Managerial Guide for Handling Cyber-Terrorism and Information Warfare, S. 129-162
6404783 Ergebnisse
Sortierung:
In: Managerial Guide for Handling Cyber-Terrorism and Information Warfare, S. 129-162
In: Managerial Guide for Handling Cyber-Terrorism and Information Warfare
In: NACLA Report on the Americas, Band 39, Heft 5, S. 36-39
ISSN: 2471-2620
Indonesia has a data access policy on one map policy geoportal. Users at each level of government have different access rights to data. The President has full rights to view and downloads the data, while the governor or regent can only see certain attributes and download only its region on the same data. Data in one map policy geoportal must be able to facilitate the differences in access rights. The one map policy geoportal uses a service query system to facilitate the classification of access to process view data. In the process of downloading data geoportal using database queries. The choice of download data through the database is based on the results of the test download data from the database and service. These results indicate that downloading data through the database is faster than downloading data through a service.
BASE
With the advent of cloud computing, sharing data through any cloud service provider has never been more economical and easier than now. It offers improved processing and storage resources as on-demand services with reduce cost, and increase efficiency, performance and reliability. All of these features and more encourage enterprises, governments and others to migrate to the cloud. However, such cloud providers more vulnerable to threats. Hence, data privacy and security issues have been major concerns for many organizations utilizing such services. The target of this survey is to explore various mechanisms like Encryption, Authentication, Key management used on clouds; that provide security, scalability and flexibility access control over public clouds.Keywords: Privacy; Security; Cloud Computing; Encryption; Access Control;
BASE
In: Cyber Warfare and Cyber Terrorism, S. 345-357
In: Cyber Warfare and Cyber Terrorism
This paper presents methods for human detection for application in the field of national security in the context of state border surveillance. Except in the context of state border security, the presented methods can be applied to monitor other protected object and infrastructure such as ports and airports, power plants, water supply systems, oil pipelines, etc. Presented methods are based on use of thermal imaging systems for the human detection, recognition and identification. In addition to methods for the detection of persons, are presented and methods for face recognition and identification of the person. The use of such systems has special significance in the context of national security in the domain of timely detection of illegal crossing of state border or illegal movement near buildings, which are of special importance for national security such as traffic infrastructure facilities, power plants, military bases, especially in mountain or forests areas. In this context, thermal imaging has significant advantages over the optical camera surveillance systems because thermal imaging is robust to weather conditions and due to such an infrared thermal system can successfully applied in any weather conditions, or the periods of the day. Featured are procedures that has human detection results as well as a brief survey of specific implementation in terms of the use of infrared thermal imagers mounted on autonomous vehicles (AV) and unmanned aerial vehicles (UAV). In addition to the above in this paper are described techniques and methods of face detection and human identification based on thermal image (thermogram).
BASE
In: Review of innovation and competitiveness: a journal of economic and social research, Band 2, Heft 4, S. 71-91
ISSN: 1849-9015
In: Humanities and Social Sciences Communications, Band 10, Heft 1
ISSN: 2662-9992
AbstractThis article studies the semantic scope of the yet undeciphered Indus script inscriptions, which are mostly found on tiny seals, sealings, and tablets. Building on previous structural analyses, which reveal that Indus script was semasiographic and/or logographic in nature, this study analyses the combinatorial patterns of Indus script signs, and the geographical distribution of the inscriptions, to establish that the inscriptions did not encode any proper noun, such as anthroponyms, toponyms, or names of specific organizations. Analyzing various archaeological contexts of the inscribed objects—e.g., seals found concentrated near city gates (e.g., Harappa), craft workshops (e.g., Chanhu-daro), and public buildings (e.g., Mohenjo-daro), often along with standardized Indus weights that were used for taxation; sealings attached to various storage containers and locking systems of "warehouse" chambers as indicated by their reverse-side impressions (e.g., the sealings of Lothal "warehouse"); inscribed sealing-pendants of Kanmer, conjectured to be passports/gate-passes by archaeologists; and seals with identical inscriptions often found from distant settlements—this study claims that the inscribed stamp-seals were primarily used for enforcing certain rules involving taxation, trade/craft control, commodity control and access control. Considering typological and functional differences between the seals and tablets, and analyzing certain numerical and metrological notations ("Image missing", "Image missing", "Image missing", "Image missing") typically found at the reverse sides of many two-sided tablets whose obverse sides contain seal-like inscriptions, this study argues that such tablets were possibly trade/craft/commodity-specific licenses issued to tax-collectors, traders, and artisans. These reverse-side tablet inscriptions possibly encoded certain standardized license fees for certain fixed license slabs, whereas their obverse-side inscriptions specified the commercial activities licensed to the tablet-bearers. These seals/tablets were possibly issued by certain guilds of merchants/artisans, and/or region-based rulers or governing bodies, who collaborated in the integration phase of IVC, to standardize certain taxation rules and trade/craft regulations across settlements. The seal/tablet iconographies might have been the emblems of the guilds, rulers, and/or governing bodies.
In: International journal of critical infrastructure protection: IJCIP, Band 6, Heft 1, S. 12-24
ISSN: 1874-5482
In: A Guide to Computer Network Security, S. 185-204
In recent decades, the number of researches on access control and user actions in computer systems has increased. Over time, there have been two models of implementing Mandatory Access Control (MAC) policies for government institutions and Discretionary Access Control (DAC) for the business environment, policies that various access control modeling solutions seek to implement. Among the access control modeling solutions developed are Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC), presented in the U.S.A. by the National Institute of Standard and Technology (NIST). In Romania, in 2010, the access control solution based on trust was presented. This paper presents Mandatory Access Control policy modeling using the trust-based access and actions control modeling solution.
BASE