Schutzprofile — Protection Profiles

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protection Profiles for Remailer Mixes

In the past independent IT security evaluation according to published criteria has not realized its potential for the assessment of privacy enhancing technologies (PETs). Main reason for this was, that PETs were not covered appropriately in the evaluation criteria. This situation has changed somewhat, and therefore this paper reports on a case study, in which we developed Protection Profiles fo...

متن کامل

Protection Profiles for Certificate Issuing & Management Systems

At the heart of many recent efforts to improve Internet security are a group of security protocols such as S/MIME, TLS, and IPSec. All of these protocols rely on public-key cryptography to help provide services such as confidentiality, data integrity, data origin authentication, and non-repudiation. Support for this public-key cryptography is provided by a Public Key Infrastructure, or PKI. The...

متن کامل

Acaricides – Biological Profiles, Effects and Uses in Modern Crop Protection

Acaricide is a pesticide designed to control harmful species of mites (Acari)1. In crop protection practices, acaricides are used against phytophagous mites, pests causing economic injuries to agricultural crops and ornamental plants. Until mid-twentieth century, in agroecosystems of low-level productivity, phytophagous mite populations usually stayed below economic injury levels, due to natura...

متن کامل

Privacy Protection of User Profiles in Personalized Information Systems

Recent years have witnessed the accelerated growth of a rich variety of personalized information systems (PISs) of unprecedented sophistication, which have been integrating seamlessly into our daily lives. Examples of these systems comprise personalized Web search and news, resource tagging in the semantic Web and multimedia recommendation systems. The key enabling technology of such systems is...

متن کامل

Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?

Early IT security evaluation criteria like the TCSEC and the ITSEC suffered much criticism for their lack of coverage of privacy-related requirements. Recent evaluation criteria, like the CC and the ISO-ECITS now contain components assigned to privacy. This is a step towards enhanced privacy protection, especially for non-experts. We examined the suitability and use of these components and the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Datenschutz und Datensicherheit - DuD

سال: 2011

ISSN: 1614-0702,1862-2607

DOI: 10.1007/s11623-011-0139-2