Alhamdani, 2017 - Google Patents

Resilent Access Control Model

Alhamdani, 2017

View PDF
Document ID
13106668086375874530
Author
Alhamdani W
Publication year
Publication venue
Journal of Applied Security Research

External Links

Snippet

Resilience is the ability to expect, prepare for, and respond and adjust to change in order to survive and prosper when unexpected disruptions occur. This method has been recognized in business, risk management, disaster recovery, and continuity plans. In this work, this …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1461Backup scheduling policy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques

Similar Documents

Publication Publication Date Title
AU2018258656B2 (en) Systems and methods for enforcing centralized privacy controls in de-centralized systems
US10043035B2 (en) Systems and methods for enhancing data protection by anonosizing structured and unstructured data and incorporating machine learning and artificial intelligence in classical and quantum computing environments
US10110584B1 (en) Elevating trust in user identity during RESTful authentication and authorization
US20180307859A1 (en) Systems and methods for enforcing centralized privacy controls in de-centralized systems
US20090064303A1 (en) Transferable restricted security tokens
US12039087B2 (en) Charter-based access controls for managing computer resources
JP2015534138A (en) Method and system for secure authentication and information sharing and analysis
Heister et al. How blockchain and AI enable personal data privacy and support cybersecurity
Tarafdar et al. Systems theoretic process analysis of information security: the case of Aadhaar
Karegar et al. Opportunities and challenges of CREDENTIAL: towards a metadata-privacy respecting identity provider
Chapple Access control and identity management
Hovav et al. Tutorial: identity management systems and secured access control
Alhamdani Resilent Access Control Model
Wills The Official (ISC) 2 SSCP CBK Reference
Maggini RESHAPING ORGANIZATIONAL PROCESSES AND WORKFLOWS THROUGH INTEGRATION OF BLOCKCHAIN TECHNOLOGY
US20240357021A1 (en) Securing sensitive data during web sessions
Bokolo Data security in chatbots for the insurance industry: a case study of a South African insurance company
AlNaaji Automating unauthorized access attempts detection and handling using robotic process automation
Georgiou Security policies for cloud computing
Moszczyński et al. The concept of improving the security of IT systems supporting the storage of knowledge in organizations
Yamaji et al. Specifying a trust model for academic cloud services
Das A Reference Manual for Data Privacy Laws and Cyber Frameworks
Bumiller Beyond risk scores: context-aware adaptive authentication
Samsudin et al. TIKAS: Kindergarten Attendance Application with Role-Based Access Control for Tadika Inovasi Kreatif
Sánchez et al. An Intercepting API-Based Access Control Approach for Mobile Applications.