File:Fig5 Jebali JofInfoTelec2020 5-1.jpg

From LIMSWiki
Jump to navigationJump to search

Original file(1,500 × 1,203 pixels, file size: 145 KB, MIME type: image/jpeg)

Summary

Description

Figure 5. An example of bypassing access control using an inference channel.

Source

Jebali, A.; Sassi, S.; Jemai, A. (2020). "Secure data outsourcing in presence of the inference problem: Issues and directions". Journal of Information and Telecommunication 5 (1): 16–34. doi:10.1080/24751839.2020.1819633. 

Date

2020

Author

Jebali, A.; Sassi, S.; Jemai, A.

Permission
(Reusing this file)

Creative Commons Attribution 4.0 International

Other versions


Licensing

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current19:07, 6 April 2021Thumbnail for version as of 19:07, 6 April 20211,500 × 1,203 (145 KB)Shawndouglas (talk | contribs)

Metadata