Search results for: AUTHORIZATION TECHNIQUES - Bridge of Knowledge

Search

Search results for: AUTHORIZATION TECHNIQUES

Best results in : Research Potential Pokaż wszystkie wyniki (2)

Search results for: AUTHORIZATION TECHNIQUES

  • Zespół Teleinformatyki

    Działalność dydaktyczna katedry związana jest z teorią informacji, metodami probabilistycznymi, statystyką matematyczną oraz szeroką gamą przedmiotów z obszaru organizacji pracy , oceny wydajności, zarządzania i projektowania sieci komputerowych. Katedra prowadzi w tym obszarze specjalność Sieci Komputerowe - oferowaną dla studentów kierunku Informatyka.* projektowania i oceny efektywności przewodowych i bezprzewodowych sieci LAN,...

  • Architektura Systemów Komputerowych

    Główną tematyką badawczą podejmowaną w Katedrze jest rozwój architektury aplikacji i systemów komputerowych, w szczególności aplikacji i systemów równoległych i rozproszonych. "Architecture starts when you carefully put two bricks together" - stwierdza niemiecki architekt Ludwig Mies von der Rohe. W przypadku systemów komputerowych dotyczy to nie cegieł, a modułów sprzętowych lub programowych. Przez architekturę systemu komputerowego...

Best results in : Business Offer Pokaż wszystkie wyniki (1)

Search results for: AUTHORIZATION TECHNIQUES

Other results Pokaż wszystkie wyniki (6)

Search results for: AUTHORIZATION TECHNIQUES

  • Usability study of various biometric techniques in bank branches

    Publication

    The purpose of the presented research was to evaluate the performance of the prepared biometric algorithms and obtain information on the opinions and preferences of their users in bank branches. The study aimed to determine users' attitudes towards particular modalities and preferences on how to use biometrics after the bank customers had practical experience with the operation of the prototype solutions. The research results...

    Full text available to download

  • Generalized access control in hierarchical computer network

    The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...

    Full text available to download

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publication

    - Year 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Full text to download in external service

  • Some Security Features of Selected IoT Platforms

    Publication

    - TASK Quarterly - Year 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Full text available to download

  • Next generation automatic IP configuration deployment issues

    Publication

    - Year 2008

    Although Dynamic Host Configuration Protocol for IPv6 (DHCPv6) protocol was defined in 2003, it was designed as a framework rather than a complete solution to the automatic configuration in IPv6 networks. There are still some unsolved problems and new options yet to be defined. One example of such case is Fully Qualified Domain Name (FQDN) option, which final version has been published in late 2007. It describes DHCPv6 client...