Searched for: subject%3A%22access%255C+control%22
(1 - 13 of 13)
document
Li, Meng (author), Shen, Yanzhe (author), Ye, Guixin (author), He, Jialing (author), Zheng, Xin (author), Zhang, Zijian (author), Zhu, Liehuang (author), Conti, M. (author)
Digital forensics is crucial to fight crimes around the world. Decentralized Digital Forensics (DDF) promotes it to another level by channeling the power of blockchain into digital investigations. In this work, we focus on the privacy and security of DDF. Our motivations arise from (1) how to track an anonymous- and-malicious data user who...
journal article 2024
document
Groenewegen, D.M. (author)
Information systems store and organize data, and manage business processes concerned with that data. Information systems aim to support operations, management and decision-making in organizations. Web applications are ideal for implementing information systems. Although existing web frameworks provide abstractions for creating web applications,...
doctoral thesis 2023
document
Ning, Jianting (author), Huang, Xinyi (author), Susilo, Willy (author), Liang, K. (author), Liu, Ximeng (author), Zhang, Yinghui (author)
Cloud-based data storage service has drawn increasing interests from both academic and industry in the recent years due to its efficient and low cost management. Since it provides services in an open network, it is urgent for service providers to make use of secure data storage and sharing mechanism to ensure data confidentiality and service...
journal article 2022
document
Rothkrantz, L.J.M. (author)
In 1979 Fukushima developed a hierarchical, multilayered neural network called Neocognitron and used it for the automatic recognition of handwritten Japanese symbols. We combined the Neocognitron classifier with a special image and segment processor and applied the system in 2001 for automatic recognition of license plates in laboratory...
conference paper 2022
document
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...
journal article 2021
document
Aslan, Y. (author), Roederer, A.G. (author), Yarovoy, Alexander (author)
The system effects and trade-offs of varying the minimal angular separation among multiple simultaneous co-frequency users are investigated for a high-capacity multibeam communication scenario. Through the statistical system simulations, it is demonstrated that the optimal (non-zero) value of the required separation depends on the base station...
conference paper 2020
document
van Engelenburg, S.H. (author), Rukanova, B.D. (author), Hofman, Wout (author), Ubacht, J. (author), Tan, Y. (author), Janssen, M.F.W.H.A. (author)
Governance requirements for systems supporting information sharing be-tween businesses and government organisations (B&G) are determined by a high variety of stakeholders with often conflicting interests. These conflict-ing interests can hamper the introduction and scaling-up of ICT-innovations that change their roles and authorities. We...
conference paper 2020
document
van Engelenburg, S.H. (author), Janssen, M.F.W.H.A. (author), Klievink, A.J. (author)
Toensurepublicsafetyandsecurity,itisvitallyimportantforgovernmentstocol- lect information from businesses and analyse it. Such information can be used to determine whether transported goods might be suspicious and therefore require physical inspection. Although businesses are obliged to report some information, they are reluctant to share addi-...
journal article 2017
document
Groenewegen, D.M. (author), Visser, E. (author)
This paper is a pre-print of: Danny M. Groenewegen, and Eelco Visser. Weaving Web Applications with WebDSL (Demonstration). In: Gary T. Leavens (editor) Companion to the 24th ACM SIGPLAN Conference on Object-Oriented Programing, Systems, Languages, and Applications (OOPSLA 2009). WebDSL is a domain-specific language for the development of web...
report 2009
document
Halkes, G.P. (author)
The advent of small, and cheap sensors provides a wide range of measuring options. By making these sensors operate wirelessly we can now measure more than ever. However, wireless operation also provides new challenges. For example, how can we make these wireless sensors communicate effectively, i.e. without all the sensors trying to talk at the...
doctoral thesis 2009
document
Pawelczak, P. (author)
doctoral thesis 2009
document
Ibrohimovna, K.M. (author), Heemstra de Groot, S. (author)
A Personal Network (PN) is a network composed of devices of a person that can communicate with each other independently from their geographical location. Extra functionality in PNs enables the cooperation amongst different persons forming a group-oriented network called a Federation of Personal Networks (Fednet). A Fednet is a secure,...
journal article 2009
document
Groenewegen, D. (author), Visser, E. (author)
Preprint of paper published in: ICWE 2008 - 8th International Conference on Web Engineering, 14-18 July 2008; doi:10.1109/ICWE.2008.15 In this paper, we present the extension of WebDSL, a domain-specific language for web application development, with abstractions for declarative definition of access control. The extension supports the definition...
report 2008
Searched for: subject%3A%22access%255C+control%22
(1 - 13 of 13)