Schutzprofile — Protection Profiles
نویسندگان
چکیده
منابع مشابه
Protection Profiles for Remailer Mixes
In the past independent IT security evaluation according to published criteria has not realized its potential for the assessment of privacy enhancing technologies (PETs). Main reason for this was, that PETs were not covered appropriately in the evaluation criteria. This situation has changed somewhat, and therefore this paper reports on a case study, in which we developed Protection Profiles fo...
متن کاملProtection Profiles for Certificate Issuing & Management Systems
At the heart of many recent efforts to improve Internet security are a group of security protocols such as S/MIME, TLS, and IPSec. All of these protocols rely on public-key cryptography to help provide services such as confidentiality, data integrity, data origin authentication, and non-repudiation. Support for this public-key cryptography is provided by a Public Key Infrastructure, or PKI. The...
متن کاملAcaricides – Biological Profiles, Effects and Uses in Modern Crop Protection
Acaricide is a pesticide designed to control harmful species of mites (Acari)1. In crop protection practices, acaricides are used against phytophagous mites, pests causing economic injuries to agricultural crops and ornamental plants. Until mid-twentieth century, in agroecosystems of low-level productivity, phytophagous mite populations usually stayed below economic injury levels, due to natura...
متن کاملPrivacy Protection of User Profiles in Personalized Information Systems
Recent years have witnessed the accelerated growth of a rich variety of personalized information systems (PISs) of unprecedented sophistication, which have been integrating seamlessly into our daily lives. Examples of these systems comprise personalized Web search and news, resource tagging in the semantic Web and multimedia recommendation systems. The key enabling technology of such systems is...
متن کاملProtection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?
Early IT security evaluation criteria like the TCSEC and the ITSEC suffered much criticism for their lack of coverage of privacy-related requirements. Recent evaluation criteria, like the CC and the ISO-ECITS now contain components assigned to privacy. This is a step towards enhanced privacy protection, especially for non-experts. We examined the suitability and use of these components and the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Datenschutz und Datensicherheit - DuD
سال: 2011
ISSN: 1614-0702,1862-2607
DOI: 10.1007/s11623-011-0139-2