Alhamdani, 2017 - Google Patents
Resilent Access Control ModelAlhamdani, 2017
View PDF- Document ID
- 13106668086375874530
- Author
- Alhamdani W
- Publication year
- Publication venue
- Journal of Applied Security Research
External Links
Snippet
Resilience is the ability to expect, prepare for, and respond and adjust to change in order to survive and prosper when unexpected disruptions occur. This method has been recognized in business, risk management, disaster recovery, and continuity plans. In this work, this …
- 238000000034 method 0 abstract description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1461—Backup scheduling policy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2018258656B2 (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
US10043035B2 (en) | Systems and methods for enhancing data protection by anonosizing structured and unstructured data and incorporating machine learning and artificial intelligence in classical and quantum computing environments | |
US10110584B1 (en) | Elevating trust in user identity during RESTful authentication and authorization | |
US20180307859A1 (en) | Systems and methods for enforcing centralized privacy controls in de-centralized systems | |
US20090064303A1 (en) | Transferable restricted security tokens | |
US12039087B2 (en) | Charter-based access controls for managing computer resources | |
JP2015534138A (en) | Method and system for secure authentication and information sharing and analysis | |
Heister et al. | How blockchain and AI enable personal data privacy and support cybersecurity | |
Tarafdar et al. | Systems theoretic process analysis of information security: the case of Aadhaar | |
Karegar et al. | Opportunities and challenges of CREDENTIAL: towards a metadata-privacy respecting identity provider | |
Chapple | Access control and identity management | |
Hovav et al. | Tutorial: identity management systems and secured access control | |
Alhamdani | Resilent Access Control Model | |
Wills | The Official (ISC) 2 SSCP CBK Reference | |
Maggini | RESHAPING ORGANIZATIONAL PROCESSES AND WORKFLOWS THROUGH INTEGRATION OF BLOCKCHAIN TECHNOLOGY | |
US20240357021A1 (en) | Securing sensitive data during web sessions | |
Bokolo | Data security in chatbots for the insurance industry: a case study of a South African insurance company | |
AlNaaji | Automating unauthorized access attempts detection and handling using robotic process automation | |
Georgiou | Security policies for cloud computing | |
Moszczyński et al. | The concept of improving the security of IT systems supporting the storage of knowledge in organizations | |
Yamaji et al. | Specifying a trust model for academic cloud services | |
Das | A Reference Manual for Data Privacy Laws and Cyber Frameworks | |
Bumiller | Beyond risk scores: context-aware adaptive authentication | |
Samsudin et al. | TIKAS: Kindergarten Attendance Application with Role-Based Access Control for Tadika Inovasi Kreatif | |
Sánchez et al. | An Intercepting API-Based Access Control Approach for Mobile Applications. |