Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
Article Fingerprint
ReserarchID
CSTNWS31055
Access control refers to securing access to the resources and allowing access up to some defined level. This paper presents various approaches implementing access control in an open domain and carries an analysis of decentralized and diverse access control (DDAC) architecture. The DDAC architecture eliminates the role of centralized authority for managing and issuing users’ credentials. It allows the users to keep the right of disclosure of their attributes under the sole control of them and also ensures that the users are not able to modify the confidential credentials which have been registered and verified by various trusted attribute providers. This paper explains the metrics for carrying the analysis and then presents a theoretical and experimental analysis of the DDAC architecture.
Gulshan Ahuja. 2012. \u201cAnalysis of Decentralized & Diverse Access Control (DDAC) Architecture\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 12 (GJCST Volume 12 Issue E13): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
The methods for personal identification and authentication are no exception.
Total Score: 107
Country: India
Subject: Global Journal of Computer Science and Technology - E: Network, Web & Security
Authors: Dr. Rajender Nath, Gulshan Ahuja (PhD/Dr. count: 1)
View Count (all-time): 234
Total Views (Real + Logic): 10179
Total Downloads (simulated): 2639
Publish Date: 2012 08, Tue
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
Access control refers to securing access to the resources and allowing access up to some defined level. This paper presents various approaches implementing access control in an open domain and carries an analysis of decentralized and diverse access control (DDAC) architecture. The DDAC architecture eliminates the role of centralized authority for managing and issuing users’ credentials. It allows the users to keep the right of disclosure of their attributes under the sole control of them and also ensures that the users are not able to modify the confidential credentials which have been registered and verified by various trusted attribute providers. This paper explains the metrics for carrying the analysis and then presents a theoretical and experimental analysis of the DDAC architecture.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.