[go: up one dir, main page]

Alhamdani, 2017 - Google Patents

Resilent Access Control Model

Alhamdani, 2017

View PDF
Document ID
13106668086375874530
Author
Alhamdani W
Publication year
Publication venue
Journal of Applied Security Research

External Links

Snippet

Resilience is the ability to expect, prepare for, and respond and adjust to change in order to survive and prosper when unexpected disruptions occur. This method has been recognized in business, risk management, disaster recovery, and continuity plans. In this work, this …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1461Backup scheduling policy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques

Similar Documents

Publication Publication Date Title
Uddin et al. A dynamic access control model using authorising workflow and task-role-based access control
US8332922B2 (en) Transferable restricted security tokens
US12039087B2 (en) Charter-based access controls for managing computer resources
US20160373455A1 (en) Methods, systems, and computer readable media for authorization frameworks for web-based applications
CN110352428A (en) By security policy manager delegation to account executive
WO2014018743A2 (en) Method and system for secure authentication and information sharing and analysis
US20230370473A1 (en) Policy scope management
Park et al. An empirical study on the influential factors affecting continuous usage of mobile cloud service
Karegar et al. Opportunities and challenges of CREDENTIAL: towards a metadata-privacy respecting identity provider
Gupta et al. A dynamic security policies generation model for access control in smart card based applications
Zelmati et al. Real-time tracking of auditing process progress with a customizable application for cybersecurity standards compliance: A case study on ISO 27001 and TISAX
Chapple Access control and identity management
Hovav et al. Tutorial: identity management systems and secured access control
Wang Data Security and Privacy Protection: A Comprehensive Guide
Alhamdani Resilent Access Control Model
AlNaaji Automating unauthorized access attempts detection and handling using robotic process automation
US20240357021A1 (en) Securing sensitive data during web sessions
Rasner et al. Privileged Access Management: The Essentials
Maggini RESHAPING ORGANIZATIONAL PROCESSES AND WORKFLOWS THROUGH INTEGRATION OF BLOCKCHAIN TECHNOLOGY
US20250272318A1 (en) Systems and methods of provisioning digital content in accordance with a regulation
Riti Identity and Access Management with Google Cloud Platform
Rasner et al. PAM Governance
Sánchez et al. An Intercepting API-Based Access Control Approach for Mobile Applications.
Moszczyński et al. The concept of improving the security of IT systems supporting the storage of knowledge in organizations
Georgiou Security policies for cloud computing