نتایج جستجو برای: security papers

تعداد نتایج: 265761  

2018
Lavinia Cazacu NEAMTU Lavinia Cazacu

The paper aims to highlight the importance of transfer pricing in the international economic environment, a topical subject, with a strong impact both on the affiliated companies and on the countries in which these companies operate. It is important to emphasize that, at present, the transfer price is an important element in the activity of companies around the world, considering the changing b...

Journal: :Journal of Medical Ultrasonics 2013

2008
Michael E. Locasto Matthew Burnside Darrell Bethea

One of the most significant unsolved problems for network managers and system administrators is how to repair a network infrastructure after discovering evidence of an extensive compromise. The technical issues are compounded by a breathtaking variety of human factors. We highlight lessons learned from three real, significant, and recent intrusion incidents. We do so as a way to expose the diff...

Journal: :Health policy and planning 2010
Catherine Lo Yuk-ping Nicholas Thomas

In the closing decade of the 20th century the myriad challenges posed by infectious disease in a globalized environment began to be re-conceptualized as threats to national and human security. The most widely applied model for identifying and responding to such threats is securitization theory, as proposed by the Copenhagen School. Although its analytical framework is generally accepted, its ut...

2013
Nicolae Paladi Christian Gehrmann Fredric Morenius

Along with the evolution of cloud computing and cloud storage towards maturity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area. In this paper, we examine the state of the art in cloud storage security through an overview of selected peer reviewed publications. We address the question of defining cloud storag...

Journal: :Trans. Data Privacy 2009
Elisa Bertino Maria Luisa Damiani

The first Workshop on Security and Privacy in GIS and LBS (SPRINGL 2008) was organized on November 4, 2008 at Irvine (CA) in conjunction with the SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM GIS 2008). The goal of the SPRINGL workshop series is to provide a forum for researchers working in the area of geospatial data security and privacy. Both security ...

2009
ARASH HABIBI LASHKARI SAMANEH FARMAND

Nowadays, user authentication is one of the important topics in information security. Text-based strong password scheme can provide security to a certain degree. However, the fact that strong passwords being difficult to memorize often leads their owners to write them down on papers or even save them in a computer file. Graphical authentication has been proposed as a possible alternative soluti...

Journal: :IACR Cryptology ePrint Archive 2016
Miguel Ambrona Gilles Barthe Benedikt Schmidt

We develop a new method to automatically prove security statements in the Generic Group Model as they occur in actual papers. We start by defining (i) a general language to describe security definitions, (ii) a class of logical formulas that characterize how an adversary can win, and (iii) a translation from security definitions to such formulas. We prove a Master Theorem that relates the secur...

2010
Sebastiaan H. von Solms

This paper gives an overview of the development of Information Security from the early 1980s up to the present time. The paper makes use of two papers by the author, Information Security – the Third Wave (von Solms, 2000) and Information Security – the Fourth Wave (von Solms, 2006), as well as a paper in preparation, Information Security – The Fifth Wave (von Solms, 2010). In the paper in 2000,...

2012
Fabio Massacci Federica Paci

Most Secure Development Software Life Cycles (SSDLCs) start from security requirements. Security Management standards do likewise. There are several methods from industry and academia to elicit and analyze security requirements, but there are few empirical evaluations to investigate whether these methods are effective in identifying security requirements. Most of the papers published in the req...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید