نتایج جستجو برای: keywords notional security

تعداد نتایج: 2121554  

2014
Sangseo Park

This study looks into the employment of deterrence to reduce security breaches within organisations. The result reveals that current deterrence is less influential. This study suggests that organisations should shift towards the detection of violations and the identification of perpetrators. The research also presents a conceptual architecture of multiple strategies. Keywords— Information Secur...

Journal: :Journal of the Medical Library Association : JMLA 2015

Journal: :Academic Medicine 1990

2012
Juhi Sharma Kshitiz Saxena

As more and more industries are moving towards Cloud Computing, with tremendous data being generated every hour, the need of the hour is not just 24X7 availability but also security. In this paper we shall discuss security concerns in Cloud Computing and shall also suggest some measures to improve security. Keywords— Cloud Computing, Hypervisor, Intrusion Detection.

2011
Smriti Jain Maya Ingle

Security level, security performance, and security indicators have become standard terms to define security metrics. The data derived from these metrics helps in measurement of software security. The metrics help achieve security objectives – confidentiality, integrity and availability. The security can be assessed for further improvement during development process of the software or the produc...

2005
Stefan Lindskog Erland Jonsson

In a Quality of Service (QoS) aware communication system, a user is able to choose between various service classes, each with different reliability, predictability, and efficiency degrees. However, until now security has not been recognized as a parameter in QoS architectures and no security-related service classes have been defined. This implies that end-users have no chance of configuring the...

2013
Yulia Cherdantseva Jeremy Hilton

Information Assurance & Security (IAS) is a dynamic domain which changes continuously in response to the evolution of society, business needs and technology. This paper proposes a Reference Model of Information Assurance & Security (RMIAS), which endeavours to address the recent trends in the IAS evolution, namely diversification and deperimetrisation. The model incorporates four dimensions: In...

2010
DeShu Lin TingLei Huang

Increasingly widespread application of mobile agent, mobile agent system’s security is a prominent problem to be solved, mobile agent’s security question is critical. In this paper, based on cryptography, computer network security, mobile agent security architecture at the same time gives the practical methods and suggested ways can be used in other new security measures. The core problem is ho...

Journal: :CoRR 2018
Payman Behnam

With ever advancing in digital system, security has been emerged as a major concern. Many researchers all around the world come up with solutions to address various challenges that are crucial for industry and market. The aim of this survey is a brief review of challenges of security validation as well as define and classify Hardware Trojans. Then, we provide more details about various validati...

2014
Mohamed Ibrahim Mohamed Shanavas

Web Services has emerged as a dominant paradigm for constructing and composing distributed business collaborations over the web. Security is one of the major concerns when developing mission critical business applications and this concern motivates Web Services Security specifications. This paper provides the literature review on the construction of solutions to SOA attacks on SOAP based web se...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید