Browsing by Subject "access control"

Sort by: Order: Results:

  • Unknown author (IEEE, 2011)
    In general service providing systems, user authentication is required for different purposes such as billing, restricting unauthorized access, etc. A good solution is to use pseudonyms as temporary identities. On the ...
  • Amro, Belal; Levi, Albert; Saygin, Yucel (IAJIT -The International Arab Journal of Information Technology, 2016-10)
    In service providing systems, user authentication is required for different purposes such as billing, restricting unauthorized access, etc., To protect the privacy of users, their real identities should not be linked to ...
  • Amro, Belal; zaid, abu znaid (AL-Rafidain Journal of Computer Sciences and Mathematics, 2021-12-16)
    Mobile malware has become a very hot research topic in the last few years, and this was due to the widespread usage of mobile devices all over the world. Like other systems, mobile devices are prune to different attacks ...