نتایج جستجو برای: security in procedures

تعداد نتایج: 17020606  

2005
P. Nikander J. Arkko

This document is an account of the rationale behind the Mobile IPv6 (MIPv6) Route Optimization security design. The purpose of this document is to present the thinking and to preserve the reasoning behind the Mobile IPv6 security design in 2001 2002. The document has two target audiences: (1) helping MIPv6 implementors to better understand the design choices in MIPv6 security procedures, and (2...

2005
P. Nikander J. Arkko

This document is an account of the rationale behind the Mobile IPv6 (MIPv6) Route Optimization security design. The purpose of this document is to present the thinking and to preserve the reasoning behind the Mobile IPv6 security design in 2001 2002. The document has two target audiences: (1) helping MIPv6 implementors to better understand the design choices in MIPv6 security procedures, and (2...

Journal: :JOEUC 2004
Merrill Warkentin Kimberly Davis Ernst Bekkering

The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures have historically been the primary method of user authentication. Th...

Journal: :CoRR 2011
Stephen Mohr Syed Rahman

IT security issues are an important aspect for each and every organization within the video game industry. Within the video game industry alone, you might not normally think of security risks being an issue. But as we can and have seen in recent news, no c big or how small. While each of these common security issues that can and do address those security issues,one of the current leading video ...

Journal: :MIS Quarterly 1989
J. L. Boockholdt

This article examines the impact on computer security and data integrity of linking personal computers in user departments with the corporate mainframe computer. It describes the results of a survey of experts in computer security and integrity. In this survey, participants identified those security and integrity controls that become critical because of the micromainframe link. The risks associ...

2007

This article examines the impact on computer security and data integrity of linking personal computers in user departments with the corporate mainframe computer. It describes the results of a survey of experts in computer security and integrity. In this survey, participants identified those security and integrity controls that become critical because of the micromainframe link. The risks associ...

2016
Muhammad Awais Javed Elyes Ben Hamida Wassim Znaidi

Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure v...

Journal: :IJSSE 2010
Aderemi O. Adeniji Seok-Won Lee

Software Assurance is the planned and systematic set of activities that ensures software processes and products conform to requirements while standards and procedures in a manner that builds trusted systems and secure software. While absolute security may not yet be possible, procedures and practices exist to promote assurance in the software lifecycle. In this paper, the authors present a fram...

2004
Ganesh Godavari Edward Chow

The objective of the proposal is to examine the existing security models for supporting information sharing among multiple agencies and suggest extension for addressing the new requirement. Procedures for enforcing and tracking secure information distribution will be investigated. Existing group key management will be enhanced to address the scaling and tracking issues. To validate the revised ...

The employee engagement has emerged as a pivotal business driver for organizational success. High level of engagement in domestic and global firms is supposed to have multiple enriching effects on an organization. Studies have highlighted the importance of both organizational and individual factors in ensuring highly engaged employees. The present paper explores the individual differs across fo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید