نتایج جستجو برای: security needs
تعداد نتایج: 415429 فیلتر نتایج به سال:
Having established a security policy, a user might wonder whether it is actually being carried out by the complex collection of people, hardware, and software that make up the information processing system. The question is: can the system be trusted to meet the needs for security that are expressed by the policy? If so, we say that the system is trusted3. A trusted system must be trusted for so...
Regarding security particularly in the field of multimedia, the requirements on security increase. If and in which way security mechanisms can be applied to multimedia data and their applications needs to be analysed for each purpose separately. This is mainly due to the structure and complexity of multimedia. Based on the main issues of IT-security, the special session introduces selected impo...
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services an RMS needs to manage, a ...
A wide range of security services may be available to applications in a heterogeneous computer network environment. Resource Management Systems (RMSs) responsible for assigning computing and network resources to tasks need to know the resource-utilization costs associated with the various network security services. In order to understand the range of security services an RMS needs to manage , a...
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
We introduce the topical relevance model (TRLM) as a generalization of the standard relevance model (RLM). The TRLM alleviates the limitations of the RLM by exploiting the multi-topical structure of pseudo-relevant documents. In TRLM, intra-topical document and query term co-occurrences are favoured, whereas the inter-topical ones are down-weighted. The multi-topical nature of pseudo-relevant d...
Internet security and technology policy research regularly uses technical indicators of abuse in order to identify culprits and to tailor mitigation strategies. As a major obstacle, readily available data are often misaligned with actual information needs. They are subject to measurement errors relating to observation, aggregation, attribution, and various sources of heterogeneity. More precise...
Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual ...
Trust computing has become more important on Web-based Social Networks (WBSNs), such as MySpace, Facebook, and LinkedIn where people interact and seek information based on trust. On existing WBSN platforms, users can explicitly specify trust value to which they have direct relationship with. The user can then make a decision based on this trust value of others and their opinions. However, the u...
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, an inherent limitation of this approach (assuming low-entropy passwords are used) is that the user’s password is exposed if this server is ever compromised. To address this issue, a number of schemes have been proposed ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید