Alhamdani, 2017 - Google Patents
Resilent Access Control ModelAlhamdani, 2017
View PDF- Document ID
- 13106668086375874530
- Author
- Alhamdani W
- Publication year
- Publication venue
- Journal of Applied Security Research
External Links
Snippet
Resilience is the ability to expect, prepare for, and respond and adjust to change in order to survive and prosper when unexpected disruptions occur. This method has been recognized in business, risk management, disaster recovery, and continuity plans. In this work, this …
- 238000000034 method 0 abstract description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1461—Backup scheduling policy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Uddin et al. | A dynamic access control model using authorising workflow and task-role-based access control | |
US8332922B2 (en) | Transferable restricted security tokens | |
US12039087B2 (en) | Charter-based access controls for managing computer resources | |
US20160373455A1 (en) | Methods, systems, and computer readable media for authorization frameworks for web-based applications | |
CN110352428A (en) | By security policy manager delegation to account executive | |
WO2014018743A2 (en) | Method and system for secure authentication and information sharing and analysis | |
US20230370473A1 (en) | Policy scope management | |
Park et al. | An empirical study on the influential factors affecting continuous usage of mobile cloud service | |
Karegar et al. | Opportunities and challenges of CREDENTIAL: towards a metadata-privacy respecting identity provider | |
Gupta et al. | A dynamic security policies generation model for access control in smart card based applications | |
Zelmati et al. | Real-time tracking of auditing process progress with a customizable application for cybersecurity standards compliance: A case study on ISO 27001 and TISAX | |
Chapple | Access control and identity management | |
Hovav et al. | Tutorial: identity management systems and secured access control | |
Wang | Data Security and Privacy Protection: A Comprehensive Guide | |
Alhamdani | Resilent Access Control Model | |
AlNaaji | Automating unauthorized access attempts detection and handling using robotic process automation | |
US20240357021A1 (en) | Securing sensitive data during web sessions | |
Rasner et al. | Privileged Access Management: The Essentials | |
Maggini | RESHAPING ORGANIZATIONAL PROCESSES AND WORKFLOWS THROUGH INTEGRATION OF BLOCKCHAIN TECHNOLOGY | |
US20250272318A1 (en) | Systems and methods of provisioning digital content in accordance with a regulation | |
Riti | Identity and Access Management with Google Cloud Platform | |
Rasner et al. | PAM Governance | |
Sánchez et al. | An Intercepting API-Based Access Control Approach for Mobile Applications. | |
Moszczyński et al. | The concept of improving the security of IT systems supporting the storage of knowledge in organizations | |
Georgiou | Security policies for cloud computing |